Networking - ICN 2001: First International Conference on Networking, Colmar, France July 9-13, 2001 Proceedings, Part II (Lecture Notes in Computer Science, 2094) 3540423036, 9783540423034

The International Conference on Networking (ICN01) is the first conference in its series aimed at stimulating technical

116 59 14MB

English Pages 952 [924] Year 2001

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Networking - ICN 2001
Preface
Table of Contents
Dynamic Resource Management Scheme for Multimedia Services in Wireless Communication Networks
1 Introduction
2 Dynamic Resource Management Scheme for Multimedia
3 Numerical Analysis
4 Numerical Results and Discussions
5 Conclusions
References
An Adaptive Handover-Supporting Routing Method for ATM Based Mobile Networks, and Its Adaptation to Ip Scenarios
Introduction
The Proposed Routing Scheme
Simulation and Results
connection setup success
Conclusions and Future Research
References
Location Stamps for Digital Signatures: A New Service for Mobile Telephone Networks
1 Introduction
2 Service Specification
2.1 Location Measurement
2.2 Cryptographic Capabilities
2.3 Binding Signature and Authentication
3 Protocol
4 Mapping onto the GSM Infrastructure
4.1 Location Stamp in GSM Networks
5 Security Considerations
5.1 Trust Model
5.2 Relay Problem
6 Related Work
7 Summary
References
A New Method for Scalable and Reliable Multicast System for Mobile Networks
1 Introduction
2 Conventional Approach and New Approach
2.1 Conventional Approach
2.2 New Approach
3 New Method
3.1 Network Architecture
3.2 Algorithm for Decision of LC (Local Controller)
3.3 Terminal Mobility
4 Evaluation
4.1 Outline of Evaluation
4.2 Simulation Model and Assumptions
4.3 Results
5 Conclusion and Future Work
References
An Adaptive Mobility Management Scheme to Support Internet Host Mobility
1 Introduction
2 An Overview of the Proposed Architecture
3 Adaptive Determination of a Foreign Agent
3.1 Mobility State and Mobility Frequency
3.2 Procedure for Choosing a Foreign Agent
4 Performance Evaluation
5 QoS Supports
6 Conclusion
References
Modeling and Analysis of TCP Enhancement over Heterogeneous Links
1 Introduction
2 Split Connection and the Network Model
2.1 Network Model
2.2 Assumptions and Parameters
3 Latency Analysis
3.1 Lossless Links
3.2 Links with Random Losses
4 Discussion and Conclusion
References
TCP Throughput Guarantee Using Packet Buffering
1 Introduction
2 Background
2.1 Collision between TCP Congestion Control and the Current AS Mechanism
3 Packet Buffering
3.1 Problem of the Token Bucket Marker
3.2 Token Bucket Marker with Data Buffer
4 Evaluation Result
4.1 Effect of the Data Buffer Size
4.2 Effect of the Subscription Level
4.3 Effect of the Reserved Bandwidth
4.4 Effect of the RTT
5 Conclusions
References
Modular TCP Handoff Design in STREAMS-Based TCP/IP Implementation
1 Introduction
2 Cluster Architectures and Request Distribution Mechanisms
3 STREAMS and STREAMS-Based TCP/IP Implementation
4 Modular TCP Handoff Design
5 Conclusion
References
An Efficient TCP Flow Control and Fast Recovery Scheme for Lossy Networks
1 Introduction
2 Proposed Delay-Based Congestion Control and Fast Recovery Mechanism
2.1 Delay-Based Control
2.2 Flow Control and Congestion Control
2.3 Fast Recovery
3 Simulation and Performance Evaluation
3.1 Simulation
3.2 Numerical Results and Performance Analysis
4 Conclusion and Future Works
References
Bandwidth Tradeoff between TCP and Link-Level FEC
1 Introduction
2 Model for Non-congestion Losses
3 Model for FEC
4 Approximation of TCP Throughput
5 The Case of Non-correlated Losses
5.1 The Analysis
5.2 Analytical Results
5.3 Simulation Results
5.4 The Tradeoff between TCP Throughput and FEC Cost
5.5 Number of Connections and the Gain in Performance
6 The Case of Correlated Losses
6.1 Performance Analysis
6.2 Analytical Results
6.3 Simulation Results
References
Supporting QoS for Legacy Applications
1 Introduction
2 The AQUILA Architecture
3 The Proxy Framework
4 Conclusions
Acknowledgement
References
An Open Architecture for Evaluating Arbitrary Quality of Service Mechanisms in Software Routers
1 Introduction
2 Building Quality of Service Behavior from Elementary QoS Models
2.1 Protocol Hooks
2.2 Behavior Elements
2.3 Interactions between Behavior Elements
2.4 Specification Language
3 Performance Evaluation
4 Conclusion
References
Measurement-Based IP Transport Resource Manager Demonstrator
Introduction
ETSI TIPHON QoS Control Model
Rôle of Measurements in Transport Level Resource Management
Measurements
Demonstrator Architecture
QoS Agent
QoS Information Format
QoS Analysis
Monitoring User Interface to QoS Data
Interface to Other Network Elements
Measurement Infrastructure
Summary
References
Packet-Size Based Queuing Algorithm for QoS Support
1 Introduction
2 Packet-Size Based Queuing: A New Scheduling Algorithm
3 Hierarchical Class Structure for PBQ
Hierarchical Shaping in H-PBQ
Priority-Labeling Scheme in HPBQ
4 Conclusion
References
Backbone Network Design with QoS Requirements
1 Introduction
2 Problem Formulation
3 Lagrangean Relaxation
4 Getting Primal Feasible Solutions
5 Computational Experiments
6 Concluding Remarks
References
A Multi-path QoS Routing Protocol in a Wireless Mobile ad Hoc Network
1 Introduction
2 Background and Motivation
2.1 QoS Routing Protocols for MANETs
2.2 Observations and Motivations
3 Our Multi-path QoS Routing Protocol
3.1 Protocol Overview
3.2 Ticket Format
3.3 Ticket Splitting and Inheritance Relation
3.4 Loop Avoidance
3.5 Ticket Distribution
3.6 Route Reply
4 Experimental Results
5 Conclusions
References
Study of a Unicast Query Mechanism for Dynamic Source Routing in Mobile ad Hoc Networks
1 Introduction
2 DS-DSR
3 Performance Evaluation
3.2 Simulation Environment
3.2 Simulation Results
4 Conclusion
References
Ad-hoc Filesystem: A Novel Network Filesystem for Ad-hoc Wireless Networks
1 Introduction
2 Assumptions
3 Design
3.1 Master and Shadow
3.2 Exploiting Client Cache
4 Simulation Results
5 Related Work
6 Conclusion
References
A Review of Current On-demand Routing Protocols
Introduction
Overview of Current Routing Protocols
Global/Proactive Routing Protocols
On-demand/Reactive Routing Protocols
Hybrid Routing Protocols
Comparison of Current On-demand Routing Protocols
Characteristic Comparison
Conclusion
References
Construction of Data Dependent Chaotic Permutation Hashes to Ensure Communications Integrity
1 Introduction
2 Chaotic Kolmogorov Systems
2.1 Continuous Kolmogorov Systems
2.2 Discrete Kolmogorov Systems
2.3 Properties of Cryptographic Relevance
2.4 Conclusion
3 Permutation Hashes Based on Chaotic Kolmogorov Systems
4 Security Analysis
4.1 Quantitative Security Analysis
5 Conclusion
References
Secure Communication: A New Application for Active Networks
1 Introduction
2 Distribution of Keys and Data
3 Generating Random
3.1 Quantity and Quality of SplitPathxspace Random
4 Implementing SplitPathxspace in an Active Network
4.1 Implementing SplitPathxspace with the Active Node Transfer System ANTS
4.2 Random Generation and the Application of the One-Time Pad
5 Evaluation of SplitPathxspace
6 Conclusion
References
Deployment of Public-Key Infrastructure in Wireless Data Networks
1 Introduction
2 The Current Wireless Environment
3 Security in the Wireless Environment
4 PKI Deployment Issues
4.1 Public Key Algorithm Selection
4.2 Key Pair Generation
4.3 Storage of Private Key and Certificates
4.4 Certificate Management
4.5 PKI Interoperability
4.6 Mobile Device Problems
5 Conclusion and Future Trends
References
A Scalable Framework for Secure Group Communication
1. Introduction
2. Basic Model
3. Registration
4. Auxiliary Key Distribution
4.1 Complete Binary Tree in Member Domain
4.2 Huffman Binary Tree in Router Domain
5. Re-keying Mechanism
5.1 Single Registered Member Joins
5.2 Single Participant Member Leaves
5.3 Multiple Registered Members Join
5.4 Multiple Participant Members Leave
6. Secure Traffic with Source Authentication
7. Comparison with Previous Works
8. Conclusion
References
Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques
Introduction
Related Work
Model
Stream Authentication Based on Linear Equations
Stream Authentication Based on Combinatorial Designs
Balanced Incomplete Block Design
Rotational Designs
Conclusion and Future Work
Acknowledgment
References
Tuning of QoS Aware Load Balancing Algorithm (QoS-LB) for Highly Loaded Server Clusters
1 Introduction
2 The Algorithm
3 Simulations
4 Results
5 Conclusions
References
The Incremental Deployability of Core-Stateless Fair Queuing
1 Introduction
2 Background
2.1 Core Stateless Fair Queuing
2.2 Incremental Deployability
3 Simulation Model
4 Simulation Results
4.1 Simple Topologies
4.2 Large Topology
4.3 Discussion and Insights
5 Summary
References
A New IP Multicast QoS Model on IP Based Networks
1 Introduction
2 MS NetMeeting Videoconferencing Application Characteristics
2.1 Overview
2.2 Packet Capturing Experiment
3 A New IP Multicast QoS Proposed Model
3.1 The Model Architecture
3.2 The Model Implementation.
4 Simulations Scenarios Results
4.1 RTS Meter Design
4.2 Different Aggregations Scenarios
4.3 IP Multicast Scenarios
5 Summary and Conclusions
6 Future Work
References
Acknowledgment
Integrated Management of QoS-Enabled Networks Using QAME
1 Introduction
2 QoS Management-Related Tasks
2.1 QoS Installation
2.2 QoS Operation Maintenance
2.3 QoS Discovery
2.4 QoS Monitoring
2.5 QoS Analysis
2.6 QoS Visualization
3 QAME
3.1 QAME Architecture
3.2 Elements Location
3.3 Protocols
4 Conclusions and Future Works
References
On Web Quality of Service: Approaches to Measurement of End-to-End Response Time
1. Introduction
2. Historical Perspective
3. ETE RT – Approaches to Measurement and Tools
3.1 General
3.2 Approaches to Measurement
3.3 Summary
4. Direct Measurement of Service Levels
4.1 Objectives
4.2 Metrics
4.3 Methods of Data Capture by Instrumented Client
4.4 Trouble with the Web
4.5 Futures
5. Conclusion
6. Acknowledgement
7. Disclaimer
References
Path Computation for Traffic Engineering in MPLS Networks
1 Introduction
2 Traffic Engineering Path Computation
2.1 Maximizing Open Flow among a Set of Bounded Length Paths
2.2 Using TE Information to Reduce Algorithm Complexity
3 Performance Studies
4 Conclusion
References
Minimum Regret Approach to Network Management under Uncertainty with Application to Connection Admission Control and Routing
1 Introduction
2 Risk Assessment and Management
2.1 Risk Assessment
2.2 Risk Management
3 Connection Admission Control and Routing under Uncertainty
3.1 Risk Associated with Connection Admission and Routing
3.2 Approximation of Separable Route Costs
4 Examples
4.1 Aggregated Competitive Scheme under Uncertain Holding Times
4.2 Aggregated Minimum Interference Routing Algorithm
References
MPLS Restoration Scheme Using Least-Cost Based Dynamic Backup Path
1 Introduction
2 Related Research
3 Dynamic Path Restoration Scheme
4 Simulation and Performance Evaluation
4.1 Simulation Environment
4.2 Simulation Results and Evaluation
5 Conclusion
References
Connection Management in MPLS Networks Using Mobile Agents
1. Introduction
2. General Architecture
3. Connection Establishment Using Mobile Agents
4. Critical Evaluation and Conclusions
References
General Connection Blocking Bounds and an Implication of Billing for Provisioned Label-Switched Routes in an MPLS Internet Cloud
1 Introduction
2 Connection-Level Shaping to Obtain Connection Blocking Bounds
3 An Implication of Pricing on a Single Provisioned Connection
3.1 General Pricing Framework for Connections
3.2 Transmission of Data Inband
4 Summary
References
FPCF Input-Queued Packet Switch for Variable-Size Packets
1 Introduction
2 Asynchronous FPCF Queuing Policy for Variable-Size Packets
2.1 Fast Packet Insertion Algorithm
3 Packet Switch Simulation
3.1 Methodology
3.2 Maximum Throughput Results
3.3 Switch Comparison Results
4 Conclusions
References
A Cost-Effective Hardware Link Scheduling Algorithm for the Multimedia Router (MMR)
1 Introduction and Motivation
2 Multimedia Router Architecture
3 Resource Scheduling Algorithm
3.1 Bandwidth Allocation
3.2 Scheduling Algorithm
4 The Simple-IABP (SIABP) Link Scheduling Algorithm
4.1 Hardware Requirements
5 Performance Evaluation
5.1 Evaluation with CBR Traffic
5.2 Evaluation with VBR Traffic
6 Conclusions
References
The Folded Hypercube ATM Switches
Introduction
Hypercube and Folded Hypercube Networks
New FHC ATM Switches
Simulation Results
Conclusion
References
Open Software Architecture for Multiservice Switching System
1 Introduction
2 MSS(Multiservice Switching System)
2.1 Multi-plane System Model
2.2 Characteristics of MSS Architecture
3. Open Software Architecture of MSS
3.1 Separation of Complexes
3.2 Processor Complex
3.3 Switch Complex
3.4 Management Complex
4 Control Scenarios for Service and Management
4.1 ATM SVC Service
4.2 Switch Partition
4.3 FCAPS Management
5 Software Developing Environment
6 Conclusion
References
A Multicast ATM Switch Based on PIPN
Introduction
Structure of the Multicast PIPN
Enhanced Distributor
Enhanced Router
Enhanced Output-Port-Dispatcher
Operations Related to Multicasting
Multicast Table and Multicast Packet Structure
Multiple Cell Generation
Results
Conclusions
References
Concurrent Access to Remote Instrumentation in CORBA-Based Distributed Environment
1 Introduction
2 Distributed Measurement System
3 Session-Oriented Remote Connection Using Arbiter Module
4 ‘Arbiter Proxy’ Pattern for Concurrent Remote Access
5 Conclusion
References
Design and Implementation of CORBA- Based Integrated Network Management System
1. Introduction
2. Platform for Integrated Network Management
2.1 The Virtual Network Element (VNE)
2.2 Design of Naming Tree for CORBA/CMIP Gateway
2.3 Design of Naming Tree for CORBA/SNMP Gateway
3. Design of the Smart Naming (SN) Service and the Multiple-Object Operation (MOO) Service
3.1 Design of SN Service
3.2 The Multiple-Object Operation (MOO) Service
4. Implementation and Performance Evaluation
5. Conclusion
References
Framework for Real-Time CORBA Development
1. Introduction
2. Real-Time CORBA Architecture Overview
3. Related Work
4. A Framework for RT-CORBA Development
4.1 Classification of Real-Time Applications
4.2 RT-IDL
4.3 Mapping of Timing Constraints and QoS onto RT-CORBA
4.4 Scheduling, Concurrency Control and Schedulability Analysis
4.5 Real-Time Communication
4.6 Operating System
4.7 Clock Synchronization
4.8 Global Schedulability Analysis
5. Conclusion
References
Development of Accounting Management Based Service Environment in Tina, Java and Corba Architectures
1 Introduction
2 TINA Overview
2.1 TINA Service Architecture
2.2 TINA Service Management
2.3 TINA Accounting Architecture
3 TINA Accounting Management Architecture and Components
3.1 Architectural Model
4 Security of TINA Accounting Management
5 Description and Visualization of the Results
5.1 Description Mechanism
5.2 Scenario Execution
6 Conclusion
References
A QoS System for CaTV Networks
1 Introduction
2 Introduction to CaTV Networks
3 Proposed Architecture
3.1 Server Architecture
4 Testbed
4.1 Server Implementation
4.2 Implemented Components
4.3 Performance Results
5 Future Work and Conclussions
References
Towards Manageable Mobile Agent Infrastructures
1 Introduction
2 Agent Management and Infrastructure Administration
3 Platform Manageability in the JAMES Project
3.1 Low-Level Management of Remote Agent Platforms
3.2 Remote Interface for External Applications
3.3 Platform Management from Legacy Applications
4 One Step Further: Maintenance of Application-Centric Mobile Agents
5 Conclusions
References
Dynamic Agent Domains in Mobile Agent Based Network Management
1 Introduction
2 Mobile Agent Delegation Schemes
3 MA Delegation with Dynamic Agent Domains
3.1 The Functioning of an Agent
3.2 Robustness
3.3 Starting an Agent Colony
3.4 Physical and Logical Topology
3.5 Overpopulation Control
4 Evaluation and Simulation Results
4.1 Comparison to Other Delegation Methods
5 Conclusions and Future Work
References
Networking in a Service Platform Based on Mobile Agents
1 Introduction
2 Distributed Agent Network
3 Networking Architecture
4 Service Example
5 Performance
6 Related Work
7 Conclusions
Acknowledgements
References
Realizing Distributed Intelligent Networks Based on Distributed Object and Mobile Agent Technologies
1 Introduction
2 Applying New Software Technologies in Intelligent Network
2.1 Enhancing IN with CORBA
2.2 Mobile Code in Intelligent Networks
3 Realizing Distributed IN Systems
3.1 Reference Architecture
3.2 The Service Execution Node
4 Conclusions
References
A New Cut-Through Forwarding Mechanism for ATM Multipoint-to-Point Connections
1 Introduction
2 ATM Multicast Proposals
2.1 Cut-Trough Forwarding
3 The Conditional Cut-Through (CCT) Forwarding Scheme
4 Comparative Results
5 Conclusions
References
Cell-by-Cell Round Robin Service Discipline for ATM Networks
1. Introduction
2. Related Work
3. Round Robin Service Discipline
4. Round Robin in ATM Environment
5. Delay Bounds and Resources Required on a Multiple Node Basis
6. CRR Service Discipline
6.1 Work-Conserving Version
6.2 Non Work-Conserving Version
7. Admission Control Tests and Traffic Descriptors
8. Evaluation and Benefits of Using CRR in ATM Networks
9. Conclusion
References
Delay and Departure Analysis of CBR Traffic in AAL MUX with Bursty Background Traffic
1 Introduction
2 Input Traffic Model and System Model
3 Queueing Analysis of AAL MUX with Infinite Buffer
4 Derivation of the Waiting Time Distribution
5 Interdeparture Time Distribution of CBR Traffic
6 Numerical Results
7 Conclusion
References
Virtual Path Layout in ATM Path with Given Hop Count
1 Introduction
2 Related Work
3 The Model
4 Results
5 Conclusion and Future Directions
A Appendix -- Proofs
A.1 Preliminaries: h=1 and h=2
A.2 Upper Bound for n_ {AA}(pi,h)
A.3 Lower Bound for n_{AA}(pi,h)
A.4 Determination of n_{AA}(pi,h)
References
Simulation-Based Stability of a Representative, Large-Scale ATM Network for a Distributed Call Processing Architecture
1 Introduction
2 Modeling the Distributed Call Processing
2.1 Modeling Memory Contention and Processor Service Time
2.2 Implementation of the Distributed Call Processor
3 Network Stability Analysis under Distributed Call Processing
3.1 The Traffic Models and Input Traffic Distributions
3.2 Simulation Experiments, Results, and Analysis
4 Conclusion
References
Proposed Architectures for the Integration of H.323 and QoS over IP Networks
1 Introduction
1.1 VoIP Schemes
1.2 QoS over IP Networks
1.3 Authorization Issues
2 Proposed Integration Architectures
2.1 Architecture 1: No Integration
2.2 Architecture 2: PDP Based Architecture
2.3 Architecture 3: Gatekeeper Based Architecture
2.4 Architecture 4: Call Switching through Gatekeeper
2.5 Architecture 5: Interaction through LDAP
3 Applications
4 Conclusions
References
Third-Party Call Control in H.323 Networks - A Case Study
1 Introduction
2 The Problem
3 Proposed Solution
3.1 Architectural Environment
3.2 Summary of SMCP
3.3 Third-Party Service Creation
4 Architecture of SMCP Network
5 Conclusion
Acknowledgments
References
Measurement-Based MMPP Modeling of Voice Traffic in Computer Networks Using Moments of Packet Interarrival Times
1 Introduction and the Proposed Technique
2 Numerical Results
3 Conclusions
References
Evaluation of End-to-End QoS Mechanisms in IP Networks
Introduction
Environment Design
QoS Mechanisms
Queuing Strategies
Reservation, Allocation, and Policing Strategies
Environment Architecture
Congestion and Control
Proxy Agents
Test Results
Conclusions
Acknowledgements
References
Web-Enabled Voice over IP Call Center. An Open Source Based Implementation
1 Motivation
2 Components
3 Implementation
4 Future Work
5 Limitations
6 Summary
References
ANMP: Active Network Management Platform for Telecommunications Applications
1 Introduction
2 A Reference Model of Active Network Management
3 System Architecture for ANMP
4 A Case Study of ANMP
5 Concluding Remarks
References
An Active Network Architecture: Distributed Computer or Transport Medium
1 Introduction
2 The New Active Network Model
2.1 Data Plane
3 Implementation
4 Related Work
5 Conclusion
References
An Active Network for Improving Performance of Traffic Flow over Conventional ATM Service
Introduction
An Active Network
Active and Passive Packets Format
Active Switching Node Architecture
Congestion Control
Cell Sequence Integrity Assurance
Analytical Results
Concluding Remarks
References
An Active Programmable Harness for Measurement of Composite Network States
1 Introduction
1.1 Related Work
1.2 Scalability
1.3 Versatility
1.4 Our Approach
2 Harness Architecture
2.1 Messaging
2.2 State Composition
3 Harness Execution Model
4 Example Probing: Transcoder Step Computation
5 Performance
6 Conclusions
7 References
Protocol Design of MPEG-4 Media Delivery with Active Networks
1 Introduction
2 Media Objects and Their Transmission
3 Active Network
4 Protocol for Media Delivery
4.1 System Overview
4.2 Packet Types
4.3 Set-Up Packet
4.4 Non-terminal SD Packet
4.5 Terminal SD Packet
4.6 Scene Packet
4.7 Reset Packet
5 Related Work
6 Conclusion
References
Prediction and Control of Short-Term Congestion in ATM Networks Using Artificial Intelligence Techniques
1 Introduction
2 Problem Analysis
3 Short-Term Congestion Prediction Using AI Techniques
3.1 Prediction Goal and Input Data
3.2 Genetic Programming Approach
4 Simulation Test-Bed
4.1 Simulation
4.2 Traffic Sources
5 Results
6 Conclusions and Further Work
Acknowledgements
References
Monitoring the Quality of Service on an ATM Network Carrying MMB Traffic Using Weighted Significance Data
1 Introduction
2 ATM (QoS)
2.1 Operation and Maintenance Cell (OAM)
2.2 Connection Admission Control (CAC)
3 Network Model
3.1 Simulated MPEG Video Traffic
3.2 Mulitstate Markov-Modulated Bernoulli (MMB) Traffic
4 Experiment
5 Result Analyses
6 Conclusions
References
ATM Traffic Prediction Using Artificial Neural Networks and Wavelet Transforms
1 Introduction
1.1 Wavelet Transforms
2 Models for ATM Traffic Prediction
2.1 Model 1: ATM Traffic Prediction Using ANN
2.2 Model 2: ATM Traffic Prediction Using ANN and Wavelet Transforms
3. Experimental Results
3.1 The Time Series
3.2 MLP ATM Traffic Prediction
3.3 MLP and Haar Wavelet Transform for ATM Traffic Prediction
4 Conclusions
References
Threshold-Based Connection Admission Control Scheme in ATM Networks: A Simulation Study
1 Introduction
2 Generating Multiplexed Traffic and Measuring the Traffic Characteristics
3 The Simulation Model and Algorithm
4 Model Verification
5 Simulation Results
6 Conclusion
References
ABR Congestion Control in ATM Networks Using Neural Networks
1 Introduction
2 NIER Scheme
3 Simulation Model
4 Results and Discussions
5 Properties of NIER Scheme
Acknowledgements
References
An Architecture for the Transport of IP Telephony Services
1 Introduction
2 Background
3 Virtual Voice Network Model
4 Study Methodology
5 Conclusion
Acknowledgments
References
Architectural Framework for Using Java Servlets in a SIP Environment
1 Introduction
2 Background and Related Work
2.1 Service Creation
2.2 Service Location and Execution
3 System View of the Novel Architecture
3.1 Policy Server
3.2 Servlet Engine
4 Servlet API
5 Prototype
6 Conclusion
References
A Practical Solution for Delivering Voice over IP
1 Introduction
2 VoIP Overview
3 Objective
4 Requirements
5 The VoIP Solution
6 Conclusion
References
QoS Guaranteed Voice Traffic Multiplexing Scheme over VoIP Network Using DiffServ
1 Introduction
2 VoIP System Architecture Using DiffServ
3 Performance Evaluation
3.1 Mathematical Model
3.2 Performance Analysis
4 Numerical Results
5 Conclusion
References
VoIP over MPLS Networking Requirements
1 Introduction
2 Extensions to E-RSVP for VoMPLS
3 Extensions to CR-LDP for VoMPLS
4 RTP Relay Functions
5 RTCP over MPLS Functions
6 Conclusion
References
A System Level Framework for Streaming 3-D Meshes over Packet Networks
1 Introduction
2 Progressive Compression
3 Error-Handling Framework
3.1 The Bit-Stream Content
3.2 Error-Handling and Packet Format
3.3 Performance Analysis
4 Conclusion
References
Techniques to Improve Quality-of-Service in Video Communications via Best Effort Networks
1 Introduction
2 Basic Methods for QoS Improvements and Their Embedding in a Video Communication System
3 QoS Improvement by Means of Local Decisions of Middleware Components
4 QoS Improvement by Means of Decisions of Communicating Middleware Components
5 QoS-Mapping for Adaptive Decision-Support: Some Examples
5.1 Mapping of N_QoS onto C_QoS
5.2 Mapping of C_QoS onto A_QoS
6 Conclusion and Outlook
References
Simulation of a Video Surveillance Network Using Remote Intelligent Security Cameras
1 Introduction
2 Experimental Methodology
2.1 Network Architectures and Protocols
2.2 R.I.S.C. Cameras
2.3 The In-station
3 Experimental Results
3.1 Network Topology
3.2 Network Activity
4 Conclusions and Future Work
References
Cooperative Video Caching for Interactive and Scalable VoD Systems
1 Introduction
2 Cooperative Video Caching
2.1 CVC Access Unit
2.2 The Client Buffer Organization
2.3 CVC Basic Protocol
2.4 The CVC Interactive Protocol
3 Experimental Methodology
3.1 Performance Comparison
3.2 Interaction Effects on CVC
4 Concluding Remarks
References
Optimal Dynamic Rate Shaping for Compressed Video Streaming
1 Introduction
2 Relevance to the State-of-the-Art
3 Rate Shaping by Adjusting Spatial, Temporal, and SNR Resolutions
4 Simulation Results and Discussion
4.1 MPEG Simulations
4.2 Three-Dimensional Subband Coding Simulation
5 Conclusions and Future Research
References
IP Stack Emulation over ATM
Introduction
Comparison between ATM and IP
Mapping Connection-Less Data over VCs
Flows and FlowPaths
Mapping Flows to VCs
Quality of Service Support
Using VCs
Establishing VCs
Sending Data
Receiving Data
Changing the QoS
TCP Emulation
Address Resolution
Small Networks
Medium-Sized Networks
Problem in Large Networks
Virtual ATM Addresses
Border Switches
Conclusion
References
ATM Network Restoration Using a Multiple Backup VPs Based Self-Healing Protocol
1 Introduction
2 MBV Protocol
3 Unidirectional Link Failure
4 Bidirectional Link Failure
5 Restoration Ratio
6 Conclusions
7 References
A New Consolidation Algorithm for Point-to-Multipoint ABR Service in ATM Networks
1 Introduction
2 Related Research-Work
3 Proposed Algorithm
3.1 Responsibility of a Branch-Point
3.2 Proposed Algorithm
4 Performance Evaluation
4.1 Parameter Values
4 Further Study of Our Proposed Algorithm
5 Conclusions
References
Experimental TCP Performance Evaluation on Diffserv Assured Forwarding over ATM SBR Service
1 Introduction
2 Diffserv AF PHB over ATM
2.1 Diffserv AF PHB
2.2 Mapping of PHBs and ATM Services
3 Overview of Experiments
3.1 Testing Methods
3.2 Experimental Configuration
4 Results of TCP Performance Measurement
4.1 Differentiation between AF PHB and DF PHB
4.2 Different Assured Packet Rates of AF PHB
5 Conclusions
References
PMS: A PVC Management System for ATM Networks
1 Introduction
2 CORBA-Based System Architecture
3 PVC Operation and Management
3.1 PVC Operations
3.2 PVC Fault Identification
3.3 Fault Prevention
4 Experiment
5 Conclusions
References
Buffer-Size Approximation for the Geo/D/1/K Queue
1 Introduction
2 Analysis of Geo/D/1/K
3 Buffer-Size Approximation
4 Numerical Results
5 Conclusion
References
Client-Server Design Alternatives: Back to Pipes but with Threads
1 Introduction
2 TCP/IP and Concurrent Java Programming
3 Client-Server Design Alternatives
3.1 TCP Iterative and Concurrent Server Designs
3.2 Pre-threaded Server, Locking around texttt {accept}
3.3 Pre-threaded Server, Connected Socket Passing through a Shared Buffer
3.4 Pre-threaded Server, Connected Socket Passing through Concurrent Queue
3.5 Pre-threaded Server, Connected Socket Passing through Concurrent Hash Table
3.6 Pre-threaded Server, Connected Socket Passing Through Pipes
4 Theoretical Analysis
4.1 Analysis of Concurrent Hashing
4.2 Analysis of Pipe Synchronization
5 Experimental Results
6 Conclusion
References
Towards a Descriptive Approach to Model Adaptable Communication Environments
Introduction
Related Work
Basic Elements of the Service Composition Model
Representing Service Aspects with Frameworks
Meta Services
The Need for a Descriptive Language for SCM
Describing the Quality of Interaction Among Components
Identifying the Points of Adaptation
The Role of Architectural Styles
Conclusion
References
All-to-All Personalized Communication Algorithms in Chordal Ring Networks
Introduction
Preliminaries
All-to-All Personalized Communication
No Fault
Single Fault
Double Fault
Performance Results in Comparison with Hypercubes
Conclusion
References
Formal and Practical Approach to Load Conditions in High Speed Networks
1 Introduction
2 Formal Approach
3 Practical Approach
4 Summary
References
Author Index
Recommend Papers

Networking - ICN 2001: First International Conference on Networking, Colmar, France July 9-13, 2001 Proceedings, Part II (Lecture Notes in Computer Science, 2094)
 3540423036, 9783540423034

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

Lecture Notes in Computer Science Edited by G. Goos, J. Hartmanis and J. van Leeuwen

2094

3

Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Singapore Tokyo

Pascal Lorenz (Ed.)

Networking – ICN 2001 First International Conference on Networking Colmar, France, July 9-13, 2001 Proceedings, Part II

13

Series Editors Gerhard Goos, Karlsruhe University, Germany Juris Hartmanis, Cornell University, NY, USA Jan van Leeuwen, Utrecht University, The Netherlands Volume Editor Pascal Lorenz University of Haute Alsace IUT de Colmar – Department GTR 34 rue du Grillenbreit 68008 Colmar, France E-mail: [email protected] Cataloging-in-Publication Data applied for Die Deutsche Bibliothek - CIP-Einheitsaufnahme Networking : first international conference ; proceedings / ICN 2001, Colmar, France, July 9 - 13, 2001. Pascal Lorenz (ed.). - Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London ; Milan ; Paris ; Singapore ; Tokyo : Springer Pt. 2 . - (2001) (Lecture notes in computer science ; Vol. 2094) ISBN 3-540-42303-6

CR Subject Classification (1998): C.2, K.4.4, H.4.3, H.5.1, H.3, K.6.4-5 ISSN 0302-9743 ISBN 3-540-42303-6 Springer-Verlag Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. Violations are liable for prosecution under the German Copyright Law. Springer-Verlag Berlin Heidelberg New York a member of BertelsmannSpringer Science+Business Media GmbH http://www.springer.de © Springer-Verlag Berlin Heidelberg 2001 Printed in Germany Typesetting: Camera-ready by author, data conversion by Steingr¨aber Satztechnik GmbH, Heidelberg Printed on acid-free paper SPIN 10839419 06/3142 543210

Preface

The International Conference on Networking (ICN01) is the first conference in its series aimed at stimulating technical exchange in the emerging and important field of networking. On behalf of the International Advisory Committee, it is our great pleasure to welcome you to the International Conference on Networking. Integration of fixed and portable wireless access into IP and ATM networks presents a cost effective and efficient way to provide seamless end-to-end connectivity and ubiquitous access in a market where demands on Mobile and Cellular Networks have grown rapidly and predicted to generate billions of dollars in revenue. The deployment of broadband IP - based technologies over Dense Wavelength Division Multiplexing (DWDM) and integration of IP with broadband wireless access networks (BWANs) are becoming increasingly important. In addition, fixed core IP/ATM networks are constructed with recent move to IP/MPLS over DWDM. More over, mobility introduces further challenges in the area that have neither been fully understood nor resolved in the preceding network generation. This first Conference ICN01 has been very well perceived by the International networking community. A total of 300 papers from 39 countries were submitted, from which 168 have been accepted. Each paper has been reviewed by several members of the scientific Program Committee. The program covers a variety of research topics which are of current interest, such as mobile and wireless networks, Internet, traffic control, QoS, switching techniques, Voice over IP (VoIP), optical networks, Differentiated and Integrated services, IP and ATM networks, routing techniques, multicasting and performance evaluation, testing and simulation and modeling. Together with four tutorials and four Keynote Speeches, these technical presentations will address the latest research results from the international industries and academia and reports on findings from mobile, satellite and personal communications on 3rd and 4th generation research projects and standardization. We would like to thank the scientific program committee members and the referees. Without their support, the program organization of this conference would not have been possible. We are also indebted to many individuals and organizations that made this conference possible (Association "Colmar-Liberty", GdR CNRS ARP, Ministère de la Recherche, Université de Haute Alsace, Ville de Colmar, France Telecom, IEEE, IEE, IST, WSES). In particular, we thank the members of the Organizing Committee for their help in all aspects of the organization of this conference.

VI

Preface

We wish that you will enjoy this International Conference on Networking at Colmar, France and that you will find it a useful forum for the exchange of ideas and results and recent findings. We also hope that you will be able to spend some times to visit Colmar, with its beautiful countryside and its major cultural attractions.

General Chair Pascal LORENZ University of Haute Alsace IUT de Colmar, France [email protected]

Technical Program Chair Guy OMIDYAR Center for Wireless Communications National University of Singapore, SG and Computer Sciences Corporation, USA [email protected]

International Scientific Committee H. Abouaissa (France) - University of Haute Alsace R. Addie (Australia) - University of Southern Queensland K. Begain (UK) - University of Bradford A. Benslimane (France) - University of Belfort-Montbeliard B. Bing (Singapore) - Ngee Ann Polytechnic A. Brandwajn (USA) - University of California Santa Cruz J.P. Coudreuse (France) - Mitsubishi J. Crowcroft (UK) - University College London S. Fdida (France) - LIP6 E. Fulp (USA) - Wake Forest University B. Gavish (USA) - Vanderbilt University H. Guyennet (France) - University of Franche-Comte Z. Hulicki (Poland) - University of Cracow R. Israel (France) - IEEE A. Jajszczyk (Poland) - University of Mining & Metallurgy A. Jamalipour (Australia) - University of Sydney S. Jiang (Singapore) - National University of Singapore S. Karnouskos (Germany) - GMD FOKUS G. Kesidis (USA) – Pennsylvania State University D. Khotimsky (USA) - Lucent Bell Labs D. Kofman (France) - ENST Paris S. Kota (USA) - Lockeed Martin D. Kouvatsos (UK) - University of Bradford S. Kumar (USA) - Ericsson G.S. Kuo (Taiwan) - National Central University F. Le Faucheur (France) - Cisco M. Lee (Korea) - Dongshin University P. Lorenz (France) - University of Haute Alsace Z. Mammeri (France) - University of Toulouse N. Mastorakis (Greece) - Military Institutions of University Education H. Mouftah (Canada) - Queen's University G. Omidyar (USA) - Computer Sciences Corp. (Program Chair) J.J. Pansiot (France) - University of Strasbourg M. Potts (Switzerland) - Martel G. Pujolle (France) - University of Versailles-Saint-Quentin S. Rao (Switzerland) - Ascom A. Reid (UK) - British Telecom S. Ritzenthaler (France) - Alcatel P. Rolin (France) - ENST Bretagne D. Sadok (Brazil) - Federal University of Pernambuco R. Saracco (Italy) - CSELT G. Swallow (USA) - Cisco H. Tobiet (France) - Clemessy M. Trehel (France) - University of Franche-Comte

VIII

Organization

V.A. Villagra (Spain) - University of Madrid E. Vazquez Gallo (Spain) - University of Madrid O. Yang (Canada) - University of Ottawa

Table of Contents

Part II

Mobility Management Dynamic Resource Management Scheme for Multimedia Services in Wireless Communication Networks ................................................................ D.-E. Lee, Chungwoon University, Korea ; B.-J. Lee, J.-W. Ko, Y.-C. Kim, Chonbuk National University, Korea An Adaptive Handover-Supporting Routing Method for ATM Based Mobile Networks, and Its Adaptation to IP Scenarios ............... S. Szabo, S. Imre, Budapest University of Technology and Economics, Hungary Location Stamps for Digital Signatures: A New Service for Mobile Telephone Networks ................................................ M. Kabatnik, University of Stuttgart, Germany ; A. Zugenmaier, University of Freiburg, Germany A New Method for Scalable and Reliable Multicast System for Mobile Networks ........................................................................................... M. Hayashi, Hitachi Europe, France ; C. Bonnet, Institute Eurecom, France An Adaptive Mobility Management Scheme to Support Internet Host Mobility M. Woo, Sejong University, Korea

1

11

20

31 41

TCP Analysis Modeling and Analysis of TCP Enhancement over Heterogeneous Links .......... M. Liu, N. Ehsan, University of Michigan, USA

51

TCP Throughput Guarantee Using Packet Buffering .......................................... S. Choi, C. Kim, Seoul National University, Korea

61

Modular TCP Handoff Design in STREAMS-Based TCP/IP Implementation ... W. Tang, L. Cherkasova, L. Russell, Hewlett Packard Labs., USA ; M.W. Mutka, Michigan State University, USA

71

An Efficient TCP Flow Control and Fast Recovery Scheme for Lossy Networks ............................................................................................. H.Y. Liao, Y.C. Chen, C.L. Lee, National Chiao Tung University, Taiwan Bandwidth Tradeoff between TCP and Link-Level FEC .................................... C. Barakat, E. Altman, INRIA, France

82 97

X

Table of Contents

QoS (I) Supporting QoS for Legacy Applications ............................................................ C. Tsetsekas, S. Maniatis, I.S. Venieris, National Technical University of Athens, Greece An Open Architecture for Evaluating Arbitrary Quality of Service Mechanisms in Software Routers ............................................................................................. K. Wehrle, University of Karlsruhe, Germany

108

117

Measurement-Based IP Transport Resource Manager Demonstrator .................. V. Räisänen, Nokia Research Center, Finland

127

Packet-Size Based Queuing Algorithm for QoS Support .................................... M.C. Choi, H.L. Owen, Georgia Tech Research Institute, USA ; J. Sokol, Siemens AG, Germany

137

Backbone Network Design with QoS Requirements ........................................... H.-H. Yen, F.Y-.S. Lin, National Taiwan University, Taiwan

148

Ad Hoc Networks A Multi-path QoS Routing Protocol in a Wireless Mobile ad Hoc Network ...... W.-H. Liao, National Central University, Taiwan ; Y.-C. Tseng, National Chiao-Tung University, Taiwan ; S.-L. Wang, J.-P. Sheu, National Central University, Taiwan

158

Study of a Unicast Query Mechanism for Dynamic Source Routing in Mobile ad Hoc Networks ................................................................................. B.-C. Seet, B.-S. Lee, C.-T. Lau, Nanyang Technological University, Singapore

168

Ad-hoc Filesystem: A Novel Network Filesystem for Ad-hoc Wireless Networks ............................. K. Yasuda, T. Hagino, Keio University, Japan

177

A Review of Current On-demand Routing Protocols .......................................... M. Abolhasan, T. Wysocki, University of Wollongong, Australia ; E. Dutkiewicz, Motorola Australia Research Centre, Australia

186

Security Construction of Data Dependent Chaotic Permutation Hashes to Ensure Communications Integrity ................................................................... J. Scharinger, Johannes Kepler University, Austria

196

Table of Contents

XI

Secure Communication: A New Application for Active Networks ..................... M. Günter, M. Brogle, T. Braun, University of Berne, Switzerland

206

Deployment of Public-Key Infrastructure in Wireless Data Networks ............... A.K. Singh, Infosys Technologies Limited, India

217

A Scalable Framework for Secure Group Communication ................................. L.-C. Wuu, H.-C. Chen, National YunLin University, Taiwan

225

Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques ............................................................................... M. Al-Ibrahim, University of Wollongong, Australia ; J. Pieprzyk, Macquarie University, Australia

239

QoS (II) Tuning of QoS Aware Load Balancing Algorithm (QoS-LB) for Highly Loaded Server Clusters ...................................................................... K. Kaario, Honeywell Industrial Automation & Control, Finland ; T. Hämäläinen, J. Zhang, University of Jyväskylä, Finland

250

The Incremental Deployability of Core-Stateless Fair Queuing .......................... Y. Blanpain, H.-Y. Hsieh, R. Sivakumar, Georgia Institute of Technology, USA

259

A New IP Multicast QoS Model on IP Based Networks ..................................... H.S. Eissa, T. Kamel, Electronics Research Institute, Egypt

268

Integrated Management of QoS-Enable Networks Using QAME ....................... L. Zambenedetti Granville, L.M. Rockenbach Tarouco, M. Bartz Ceccon, M.J. Bosquiroli Almeida, Federal University of Rio Grande do Sul, Brazil

277

On Web Quality of Service: Approaches to Measurement of End-to-End Response Time ............................................................................ M. Tsykin, Fujitsu Australia Limited, Australia

291

MPLS Path Computation for Traffic Engineering in MPLS Networks .......................... G. Banerjee, D. Sidhu, University of Maryland, USA Minimum Regret Approach to Network Management under Uncertainty with Applications to Connection Admission Control and Routing ..................... V. Marbukh, National Institute of Standards and Technology, USA

302

309

XII

Table of Contents

MPLS Restoration Scheme Using Least-Cost Based Dynamic Backup Path ...... G. Ahn, Electronics and Telecommunications Research Institute, Korea ; W. Chun, Chungnam National University, Korea

319

Connection Management in MPLS Networks Using Mobile Agents .................. S. Yucel, Marconi Communications, USA ; T. Saydam, University of Delaware, USA

329

General Connection Blocking Bounds and an Implication of Billing for Provisioned Label-Switched Routes in an MPLS Internet Cloud .................. G. Kesidis, Pennsylvania State University, USA ; L. Tassiulas, University of Maryland, USA

339

Switches FPCF Input-Queued Packet Switch for Variable-Size Packets ............................ P. Homan, J. Bester, University of Ljubljana, Slovenia A Cost-Effective Hardware Link Scheduling Algorithm for the Multimedia Router (MMR) ...................................................................... M.B. Caminero, C. Carrión, F.J. Quiles, University of Castilla-La Mancha, Spain ; J. Duato, Polytechnical University of Valencia, Spain ; S. Yalamanchili, Georgia Institute of Technology, USA

348

358

The Folded Hypercube ATM Switches ............................................................... J.S. Park, N.J. Davis IV, Virginia Polytechnic Institute and State University, USA

370

Open Software Architecture for Multiservice Switching System ........................ H.-J. Park, Y.-I. Choi, B.-S. Lee, K.-P. Jun, Electronics & Telecommunication Research Institute, Korea

380

A Multicast ATM Switch Based on PIPN ........................................................... S.F. Oktug, Istanbul Technical University, Turkey

390

CORBA Concurrent Access to Remote Instrumentation in CORBA-Based Distributed Environment ........................................................ A. Stranjak, Lucent Technologies, Ireland ; D. Kovačić, I. Čavrak, M. Žagar, University of Zagreb, Croatia Design and Implementation of CORBA-Based Integrated Network Management System .............................. J.-H. Kwon, HyComm Incorporated, USA ; J.-T. Park, Kyungpook National University, Korea

399

409

Table of Contents

XIII

Framework for Real-Time CORBA Development .............................................. Z. Mammeri, J. Rodriguez, University of Toulouse, France ; P. Lorenz, IUT de Colmar, University of Haute Alsace, France

422

Development of Accounting Management Based Service Environment in Tina, Java and Corba Architectures ................................................................. A. Sekkaki, University Hassan II, Morocco ; L.M. Cáceres Alvarez, W. Tatsuya Watanabe, C. Becker Westphall, Federal University of Santa Catarina, Brazil A QoS System for CaTV Networks ..................................................................... J. Leal, J.M. Fornés, University of Sevilla, Spain

438

449

Mobile Agents Towards Manageable Mobile Agent Infrastructures ........................................... P. Simões, P. Marques, L. Silva, J. Silva, F. Boavida, University of Coimbra, Portugal

458

Dynamic Agent Domains in Mobile Agent Based Network Management .......... R. Sugar, S. Imre, Technical University of Budapest, Hungary

468

Networking in a Service Platform Based on Mobile Agents ............................... M. Palola, VTT Electronics, Finland

478

Realizing Distributed Intelligent Networks Based on Distributed Object and Mobile Agent Technologies ............................ M.K. Perdikeas, O.I. Pyrovolakis, A.E. Papadakis, I.S. Venieris, National Technical University of Athens, Greece

488

ATM Networks (I) A New Cut-Through Forwarding Mechanism for ATM Multipoint-to-Point Connections .......................................................... A. Papadopoulos, Computers Technology Institute, Greece ; T. Antonakopoulos, V. Makios, University of Patras, Greece Cell-by-Cell Round Robin Service Discipline for ATM Networks ..................... H.M. Mokhtar, R. Pereira, M. Merabti, Liverpool John Moores University, UK Delay and Departure Analysis of CBR Traffic in AAL MUX with Bursty Background Traffic .......................................................................... C.G. Park, D.H. Han, Sunmoon University, Korea Virtual Path Layout in ATM Path with Given Hop Count .................................. S. Choplin, INRIA, France

497

507

517 527

XIV

Table of Contents

Simulation-Based Stability of a Representative, Large-Scale ATM Network for a Distributed Call Processing Architecture .................................................... R. Citro, Intel Corporation, USA ; S. Ghosh, Stevens Institute of Technology, USA

538

Voice over IP (I) Proposed Architectures for the Integration of H.323 and QoS over IP Networks R. Estepa, J. Leal, J.A. Ternero, J.M. Vozmediano, University of Sevilla, Spain

549

Third-Party Call Control in H.323 Networks – A Case Study ............................. A. Miloslavski, V. Antonov, L. Yegoshin, S. Shkrabov, J. Boyle, G. Pogosyants, N. Anisimov, Genesys Telecommunication Labs, USA

559

Measurement-Based MMPP Modeling of Voice Traffic in Computer Networks Using Moments of Packet Interarrival Times ...................................................... N.S. Kambo, D.Z. Deniz, T. Iqbal, Eastern Mediterranean University, Turkey

570

Evaluation of End-to-End QoS Mechanisms in IP Networks .............................. F.A. Shaikh, S. McClellan, University of Alabama at Birmingham, USA

579

Web-Enabled Voice over IP Call Center ............................................................. S. Kuhlins, University of Mannheim, Germany ; D. Gutacker, OSI mbH, Germany

590

Active Networks ANMP: Active Network Management Platform for Telecommunications Applications ................................................................. W.-K. Hong, M.-J. Jung, Korea Telecom, Korea

599

An Active Network Architecture: Distributed Computer or Transport Medium . E. Hladká, Z. Salvet, Masaryk University, Czech Republic

612

An Active Network for Improving Performance of Traffic Flow over Conventional ATM Service ......................................................................... E. Rashid, T. Araki, Hirosaki University, Japan ; T. Nakamura, Tohoku University, Japan

620

An Active Programmable Harness for Measurement of Composite Network States .................................................. J.I. Khan, A.U. Haque, Kent State University, USA Protocol Design of MPEG-4 Media Delivery with Active Networks .................. S. Go, J.W. Wong, University of Waterloo, Canada ; Z. Wu, Bond University, Australia

628 639

Table of Contents

XV

Prediction and Control of Short-Term Congestion in ATM Networks Using Artificial Intelligence Techniques ............................................................. G. Corral, A. Zaballos, J. Camps, J.M. Garrell, University Ramon Llull, Spain

648

Monitoring the Quality of Service on an ATM Network Carrying MMB Traffic Using Weighted Significance Data .......................................................... A.A.K. Mouharam, M.J. Tunnicliffe, Kingston University, UK

658

ATM Networks (II)

ATM Traffic Prediction Using Artificial Neural Networks and Wavelet Transforms ............................... P. Solís Barreto, Catholic University of Goiás, Brazil ; R. Pinto Lemos, Federal University of Goiás, Brazil Threshold-Based Connection Admission Control Scheme in ATM Networks: A Simulation Study ............................................................................................. X. Yuan, North Carolina A & T State University, USA ; M. Ilyas, Florida Atlantic University, USA ABR Congestion Control in ATM Networks Using Neural Networks ................ K. Dimyati, C.O. Chow, University of Malaya, Malaysia

668

677

687

Voice over IP (II) An Architecture for the Transport of IP Telephony Services .............................. S. Guerra, J. Vinyes, D. Fernández, Technical University of Madrid, Spain

697

Architectural Framework for Using Java Servlets in a SIP Environment ........... R. Glitho, R. Hamadi, R. Huie, Ericsson Research Canada, Canada

707

A Practical Solution for Delivering Voice over IP .............................................. S. Milanovic, Serco Group plc, Italy; Z. Petrovic, University of Belgrade, Yugoslavia

717

QoS Guaranteed Voice Traffic Multiplexing Scheme over VoIP Network Using DiffServ ..................................................................................................... E.-J. Ha, J.-H. Kwon, J.-T. Park, Kyungpook National University, Korea VoIP over MPLS Networking Requirements ...................................................... J.-M. Chung, Oklahoma State University, USA ; E. Marroun, H. Sandhu, Cisco Systems, USA ; S.-C. Kim, Oklahoma State University, USA

726 735

XVI

Table of Contents

Video Communications A System Level Framework for Streaming 3-D Meshes over Packet Networks . G. Al-Regib, Y. Altunbasak, Georgia Institute of Technology, USA Techniques to Improve Quality-of-Service in Video Communications via Best Effort Networks ..................................................................................... B.E. Wolfinger, M. Zaddach, Hamburg University, Germany Simulation of a Video Surveillance Network Using Remote Intelligent Security Cameras ........................................................ J.R. Renno, M.J. Tunnicliffe, G.A. Jones, Kingston University, UK ; D.J. Parish, Loughborough University, UK

745

754

766

Cooperative Video Caching for Interactive and Scalable VoD Systems ............. E. Ishikawa, C. Amorim, Federal University of Rio de Janeiro, Brazil

776

Optimal Dynamic Rate Shaping for Compressed Video Streaming .................... M. Kim, Y. Altunbasak, Georgia Institute of Technology, USA

786

ATM Networks (III) IP Stack Emulation over ATM ............................................................................ I.G. Goossens, I.M. Goossens, Free University of Brussels, Belgium ATM Network Restoration Using a Multiple Backup VPs Based Self-Healing Protocol ............................... S.N. Ashraf, INT, France ; C. Lac, France Télécom R&D, France A New Consolidation Algorithm for Point-to-Multipoint ABR Service in ATM Networks ................................................................................................ M. Shamsuzzaman, A.K. Gupta, B.-S. Lee, Nanyang Technological University, Singapore Experimental TCP Performance Evaluation on DiffServ Assured Forwarding over ATM SBR Service ................................. S. Ano, T. Hasegawa, KDDI R&D Laboratories Inc, Japan ; N. Decre, ENST, France PMS: A PVC Management System for ATM Networks ..................................... C. Yang, S. Phan, National Research Council of Canada, Canada

795

805

815

825

836

Table of Contents

XVII

Modelization Buffer-Size Approximation for the Geo/D/1/K Queue ........................................ P. Linwong, Tohoku University, Japan ; A. Fujii, Miyagi University, Japan ; Y. Nemoto, Tohoku University, Japan

845

Client-Server Design Alternatives: Back to Pipes but with Threads ................... B. Roussev, Susquehanna University, USA ; J. Wu, Florida Atlantic University, USA

854

Towards a Descriptive Approach to Model Adaptable Communication Environments ........................................... A.T.A. Gomes, S. Colcher, L.F.G. Soares, PUC-Rio, Brazil

867

All-to-All Personalized Communication Algorithms in Chordal Ring Networks .................................................................................... H. Masuyama, H. Taniguchi, T. Miyoshi, Tottori University, Japan

877

Formal and Practical Approach to Load Conditions in High Speed Networks ... A. Pollak, University of the Armed Forces Munich, Germany

890

Author Index ......................................................................................................

895

Table of Contents

Part I

3rd to 4th Generation Bandwidth Management for QoS Support in Mobile Networks ......................... S.-H. Lee, D.-S. Jung, Electronics & Telecommunication Research Institute, Korea ; S.-W. Park, Hannam University, Korea

1

3G and Beyond & Enabled Adaptive Mobile Multimedia Communication ........ T. Kanter, Ericsson Radio Systems AB, Sweden ; T. Rindborg, D. Sahlin, Ericsson Utvecklings, Sweden

12

rd

Creation of 3 Generation Services in the Context of Virtual Home Environment ..................................................... J. Oliveira, University of Porto, Portugal ; R. Roque, Portugal Telekom, Portugal ; S. Sedillot, INRIA, France ; E. Carrapatoso, University of Porto, Portugal

27

Internet (I) WLL Link Layer Protocol for QoS Support of Multi-service Internet ................ H. Pham, B. Lavery, James Cook University, Australia ; H.N. Nguyen, Vienna University of Technology, Austria The Earliest Deadline First Scheduling with Active Buffer Management for Real-Time Traffic in the Internet ................................................................... X. Hei, D.H.K. Tsang, Hong Kong University of Science and Technology, Hong Kong

37

45

Pricing and Provisioning for Guaranteed Internet Services ................................. Z. Fan, University of Birmingham, UK

55

Price Optimization of Contents Delivery Systems with Priority ......................... K. Yamori, Y. Tanaka, Waseda University, Japan ; H. Akimaru, Asahi University, Japan

65

An Approach to Internet-Based Virtual Call Center Implementation ................. M. Popovic, V. Kovacevic, University of Novi Sad, Yugoslavia

75

Traffic Control Implementation and Characterization of an Advanced Scheduler ....................... F. Risso, Politecnico of Torino, Italy

85

Table of Contents

A Performance Study of Explicit Congestion Notification (ECN) with Heterogeneous TCP Flows .......................................................................... R. Kinicki, Z. Zheng, Worcester Polytechnic Institute, USA

XIX

98

Diffusion Model of RED Control Mechanism .................................................... R. Laalaoua, S. Jedruś, T. Atmaca, T. Czachórski, INT, France

107

A Simple Admission Control Algorithm for IP Networks .................................. K. Kim, P. Mouchtaris, S. Samtani, R. Talpade, L. Wong, Telcordia Technologies, USA

117

An Architecture for a Scalable Broadband IP Services Switch ........................... M.V. Hegde, M. Naraghi-Poor, J. Bordes, C. Davis, O. Schmid, M. Maher, Celox Networks Inc., USA

124

Mobile and Wireless IP On Implementation of Logical Time in Distributed Systems Operating over a Wireless IP Network ................................................................................. D.A. Khotimsky, Lucent Technologies, USA ; I.A. Zhuklinets, Mozhaysky University, Russia Performance of an Inter-segment Handover Protocol in an IP-based Terrestrial/Satellite Mobile Communications Network ............... L. Fan, M.E. Woodward, J.G. Gardiner, University of Bradford, UK Performance Evaluation of Voice-Data Integration for Wireless Data Networking ............................................................................. M. Chatterjee, S.K. Das, The University of Texas at Arlington, USA ; G.D. Mandyam, Nokia Research Center, USA A Hard Handover Control Scheme Supporting IP Host Mobility ....................... Y. Takahashi, N. Shinagawa, T. Kobayashi, YRP Mobile Telecommunications Key Technology Research Laboratories, Japan

137

147

157

167

Internet (II) A Flexible User Authentication Scheme for Multi-server Internet Services ....... W.-J. Tsaur, Da-Yeh University, Taiwan NetLets: Measurement-Based Routing for End-to-End Performance over the Internet .................................................... N.S.V. Rao, Oak Ridge National Laboratory, USA ; S. Radhakrishnan, B.-Y. Choel, University of Oklahoma, USA

174

184

XX

Table of Contents

Using the Internet in Transport Logistics – The Example of a Track & Trace System ........................................................... K. Jakobs, C. Pils, M. Wallbaum, Technical University of Aachen, Germany Distributed Management of High-Layer Protocols and Network Services through a Programmable Agent-Based Architecture ........................................... L.P. Gaspary, L.F. Balbinot, R. Storch, F. Wendt, L. Rockenbach Tarouco, Federal University of Rio Grande do Sul, Brazil

194

204

Differentiated Services A Buffer-Management Scheme for Bandwidth and Delay Differentiation Using a Virtual Scheduler .................................................................................... R. Pletka, P. Droz, IBM Research, Switzerland ; B. Stiller, ETH Zürich, Switzerland Enhanced End-System Support for Multimedia Transmission over the Differentiated Services Network ........................................................... H. Wu, Tsinghua University, China ; H.-R. Shao, Microsoft Research, China ; X. Li, Tsinghua University, China

218

235

Investigations into the Per-Hop Behaviors of DiffServ Networks ...................... Z. Di, H.T. Mouftah, Queen's University, Canada

245

An Adaptive Bandwidth Scheduling for Throughput and Delay Differentiation H.-T. Nguyen, H. Rzehak, University of Federal Armed Forces Munich, Germany

256

Evaluation of an Algorithm for Dynamic Resource Distribution in a Differentiated Services Network ................................................................... E.G. Nikolouzou, P.D. Sampatakos, I.S. Venieris, National Technical University of Athens, Greece

266

GPRS and Cellular Networks Quality of Service Management in GPRS Networks ........................................... P. Stuckmann, F. Müller, Aachen University of Technology, Germany Case Studies and Results on the Introduction of GPRS in Legacy Cellular Infrastructures ....................................................................... C. Konstantinopoulou, K. Koutsopoulos, P. Demestichas, E. Matsikoudis, M. Theologou, National Technical University of Athens, Greece Traffic Analysis of Multimedia Services in Broadband Cellular Networks ........ P. Fazekas, S. Imre, Budapest University of Technology and Economics, Hungary

276

286

296

Table of Contents

Scheduling Disciplines in Cellular Data Services with Probabilistic Location Errors ....................................................................... J.-L. Chen, H.-C. Cheng, H.-C. Chao, National Dong Hwa University, Taiwan

XXI

307

WDM and Optical Networks Restoration from Multiple Faults in WDM Networks without Wavelength Conversion ......................................................................... C.-C. Sue, S.-Y. Kuo, National Taiwan University, Taiwan An All-Optical WDM Packet-Switched Network Architecture with Support for Group Communication ............................................................. M.R. Salvador, S.Heemstra de Groot, D. Dey, University of Twente, The Netherlands Performance Consideration for Building the Next Generation Multi-service Optical Communications Platforms ............. S. Dastangoo, Onex™ Communications Corporation, USA Traffic Management in Multi-service Optical Network ...................................... H. Elbiaze, T. Atmaca, INT, France Performance Comparison of Wavelength Routing Optical Networks with Chordal Ring and Mesh-Torus Topologies ................................................. M.M. Freire, University of Beira Interior, Portugal ; H.J.A. da Silva, University of Coimbra, Portugal

317

326

336 348

358

Differentiated and Integrated Services Achieving End-to-End Throughput Guarantee for Individual TCP Flows in a Differentiated Services Network ................................................................... X. He, H. Che, The Pennsylvania State University, USA

368

Performance Evaluation of Integrated Services in Local Area Networks ........... J. Ehrensberger, Swiss Federal Institute of Technology, Switzerland

378

Integrating Differentiated Services with ATM .................................................... S. Manjanatha, R. Bartoš, University of New Hampshire, USA

388

Management and Realization of SLA for Providing Network QoS .................... M. Hashmani, M. Yoshida, NS Solutions Corporation, Japan ; T. Ikenaga, Y. Oie, Kyushu Institute of Technology, Japan

398

XXII

Table of Contents

Optimal Provisioning and Pricing of Internet Differentiated Services in Hierarchical Markets ....................................................................................... E.W. Fulp, Wake Forest University, USA ; D.S. Reeves, N.C. State University, USA Keynote Speech Adding Interactive Services in a Video Broadcasting Network .......................... R. Jäger, BetaResearch, Germany

409

419

Wireless ATM A Discrete-Time Queuing Analysis of the Wireless ATM Multiplexing System M.M. Ali, X. Zhang, J.F. Hayes, Concordia University, Canada A QoS Based Distributed Method for Resource Allocation in Unlicensed Wireless ATM Systems ................................................................ G.F. Marias, L. Merakos, University of Athens, Greece

429

439

An Adaptive Error Control Mechanism for Wireless ATM ................................ P.R. Denz, A.A. Nilsson, North Carolina State University, USA

449

A Review of Call Admission Control Schemes in Wireless ATM Networks ...... D.D. Vergados, N.G. Protopsaltis, C. Anagnostopoulos, J. Anagnostopoulos, M.E. Theologou, E.N. Protonotarios, National Technical University of Athens, Greece

459

Multicast (I) Analysis and Evaluation of QoS-Sensitive Multicast Routing Policies ............... E. Pagani, G.P. Rossi, University of Milano, Italy Multicast Performance of Multistage Interconnection Networks with Shared Buffering ......................................................................................... D. Tutsch, International Computer Science Institute, USA ; M. Hendler, G. Hommel, Technical University of Berlin, Germany

468

478

Performance Evaluation of PIM-SM Recovery ................................................... T. Čičić, S. Gjessing, University of Oslo, Norway ; Ø. Kure, Norwegian University of Science and Technology, Norway

488

Reducing Multicast Inter-receiver Delay Jitter – A Server Based Approach ...... J.-U. Klöcking, C. Maihöfer, K. Rothermel, University of Stuttgart, Germany

498

Multicast Routing and Wavelength Assignment in Multi-Hop Optical Networks R. Libeskind-Hadas, Harvey Mudd College, USA ; R. Melhem, University of Pittsburgh, USA

508

Table of Contents

XXIII

Real-Time Traffic Improving the Timed Token Protocol ................................................................. Y. Bouzida, R. Beghdad, EMP, Algeria

520

Design of a Specification Language and Real-Time APIs for Easy Expression of Soft Real-Time Constraints with Java ............................ K.-Y. Sung, Handong University, Korea

530

Feedback-Controlled Traffic Shaping for Multimedia Transmissions in a Real-Time Client-Server System .................................................................. G.-M. Muntean, L. Murphy, University College Dublin, Ireland

540

Bandwidth Reallocation Techniques for Admitting High Priority Real-Time Calls in ATM Networks ........................ L.K. Miller, University of Toledo, USA ; E.L. Leiss, University of Houston, USA

549

Temporal Control Specifications and Mechanisms for Multimedia Multicast Communication Services ............................................ H.-Y. Kung, National Pingtung University of Science and Technology, Taiwan; C.-M. Huang, National Cheng Kung University, Taiwan

559

Wireless (I) Improving Fairness and Throughput in Multi-Hop Wireless Networks .............. H.-Y. Hsieh, R. Sivakumar, Georgia Institute of Technology, USA Dynamic Allocation of Transmitter Power in a DS-CDMA Cellular System Using Genetic Algorithms ................................................................................... J. Zhou, Y. Shiraishi, U. Yamamoto, Y. Onozato, Gunma University, Japan

569

579

The Coexistence of Multicast and Unicast over a GPS Capable Network .......... T. Asfour, A. Serhrouchni, ENST, France

589

An Approach for QoS Scheduling on the Application Level for Wireless Networks ......................................................................................... D.-H. Hoang, D. Reschke, TU Ilmenau, Germany

599

Multicast (II) A Host-Based Multicast (HBM) Solution for Group Communications ............... V. Roca, A. El-Sayed, INRIA Rhône-Alpes, France

610

An Evaluation of Shared Multicast Trees with Multiple Active Cores ............... D. Zappala, A. Fabbri, University of Oregon, USA

620

XXIV

Table of Contents

QoS Routing Protocol for the Generalized Multicast Routing Problem (GMRP) H. Bettahar, A. Bouabdallah, Technical University of Compiègne, France

630

Feedback Scalability for Multicast Videoconferencing........................................ H. Smith, California Polytechnic State University, USA ; M. Mutka, L. Yang, Michigan State University, USA

640

Group Communication and Multicast .................................................................. J. Templemore-Finlayson, S. Budkowski, INT, France

649

Routing Avoiding Counting to Infinity in Distance Vector Routing ................................. A. Schmid, O. Kandel, C. Steigner, University of Koblenz-Landau, Germany

657

Proposal of an Inter-AS Policy Routing and a Flow Pricing Scheme to Improve ASes' Profits ..................................................................................... N. Ogino, M. Suzuki, KDD R&D Laboratories Inc., Japan

673

Stigmergic Techniques for Solving Multi-constraint Routing for Packet Networks ............................................................................................ T. Michalareas, L. Sacks, University College London, UK

687

Dynamic Capacity Resizing of Virtual Backbone Networks ............................... S.H. Rhee, Kwangwoon University, Korea ; J. Yoon, H. Choi, I. Choi, ETRI/National Security Research Institute, Korea

698

Wireless (II) Throughput Improvements Using the Random Leader Technique for the Reliable Multicast Wireless LANs ........................................................... H.-C. Chao, National Dong Hwa University, Taiwan ; S.W. Chang, Southern Information System Inc., Taiwan ; J.L. Chen, National Dong Hwa University, Taiwan

709

Performance Evaluation and Implementation of QoS Support in an 802.11b Wireless LAN ............................................................................... V. Mirchandani, E. Dutkiewicz, Motorola Australian Research Centre, Australia

720

Increasing Throughput and QoS in a HIPERLAN/2 System with Co-channel Interference .............................................................................. J. Rapp, Aachen University of Technology, Germany

727

An Intra-media Multimode Wireless Communication Terminal for DSRC Service Networks ................................................................................ M. Umemoto, Yokosuka ITS Research Center, Japan

737

Table of Contents

XXV

Traffic Analysis, Modeling and Simulation Simulation of Traffic Engineering in IP-Based Networks ................................... T.T.M. Hoang, W. Zorn, University of Karlsruhe, Germany

743

An Algorithm for Available Bandwidth Measurement ....................................... J. He, C.E. Chow, J. Yang, T. Chujo, Fujitsu Laboratories of America Inc., USA

753

Influence of Network Topology on Protocol Simulation .................................... D. Magoni, J.-J. Pansiot, Université Louis Pasteur, France

762

An Adaptive Flow-Level Load Control Scheme for Multipath Forwarding ....... Y. Lee, Y. Choi, Seoul National University, Korea

771

Performance Evaluation of CANIT Algorithm in Presence of Congestion Losses ........................................................................ H. Benaboud, N. Mikou, University of Bourgogne, France

780

User Applications Project Driven Graduate Network Education ...................................................... A. Van de Capelle, E. Van Lil, J. Theunis, J. Potemans, M. Teughels, K.U. Leuven, Belgium

790

Modelling User Interaction with E-commerce Servers ....................................... H. Graja, J. McManis, School of Electronic Engineering, Ireland

803

XML Smartcards ................................................................................................. P. Urien, H. Saleh, A. Tizraoui, Bull, France

811

The Influence of Web Page Images on the Performance of Web Servers ........... C. Hava Muntean, J. McManis, J. Murphy, Dublin City University, Ireland

821

Network Resilience in Multilayer Networks: A Critical Review and Open Issues ..................................................................... F. Touvet, D. Harle, University of Strathclyde, UK

829

Author Index .......................................................................................................

839

Dynamic Resource Management Scheme for Multimedia Services in Wireless Communication Networks Dong-Eun Lee1 , Bong-Ju Lee2 , Jae-Wook Ko3 , and Young-Chon Kim4 1

3

Dept. of Internet and Computer, Chungwoon Univ., Korea [email protected] 2 Dept. of Image Eng., Chonbuk National Univ., Korea Dept. of Infomation and Communication, Chonbuk National Univ., Korea 4 Dept. of Computer Eng., Chonbuk National Univ., Korea {bjlee, jwko, yckim}@networks.chonbuk.ac.kr http://networks.chonbuk.ac.kr

Abstract. We present a dynamic wireless resource management scheme considering the call level QoS and mobility characteristics for multimedia services in wireless communication networks. The objectives of proposed scheme are to improve the utilization of wireless resources and to reduce the blocking probability of new call while guaranteeing the required QoS of handoff calls with various service classes. The wireless resources are reserved preferentially for handoff calls in order to provide their required call level QoS. Those resources can also be dynamically allocated as much as request probability of each class for new calls. The request probability of each class is determined by using the mobility characteristics, channel occupancy, and correction factor of each classes to keep the new call blocking proability as low as possible.

1

Introduction

With the increasing demands for mobilie multimedia services, future wireless networks will adopt micro/pico-cellular architecture in order to provide the higher capacity needed to support broadband services under the limited radio spectrum.[1] Due to its flexible bandwidth allocation, efficient multiplexing of burst traffic, and provision of a wide range of wireless broadband services, the wireless asynchronous transfer mode networks is a promising solution for the next-generation wireless communication system. However, handoff will occur frequently in the networks because the cell size is much smaller to support higher capacity on the limited radio spectrum. As the handoff rate increase, bandwidth management and traffic control strategy (call admission control, handoff procedure, etc.) become more challenging problems in wireless networks. Handoff is the action of switching a call in progress in order to maintain continuity and the required quality of service (QoS) of the call when a mobile terminal moves from one cell to another.[2] In the wireless environment, we need to consider two additional QoS parameters: dropping probability of handoff calls P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 1–10, 2001. c Springer-Verlag Berlin Heidelberg 2001 

2

D.-E. Lee et al.

and blocking probability of new calls from the standpoint of call-level QoS. If the base station (BS) has no idle channels, it may drop the handoff request and cause forced termination of the call in progress. From the subscriber’s point of view, forced termination due to handoff calls is less desirable than blocking of a new call. Therefore, the QoS of handoff calls must be guaranteed while allowing high utilization of wireless channels. Up to the present, intensive research on resource management schemes such as guard channel scheme (GCS) and handoff queuing scheme has been progress to guarantee the QoS by assigning the handoff calls to a higher priority. In general, handoff prioritization schemes result in decrement of handoff failures and increment of call blocking, which, in turn, reduce total admitted traffic and were able to support only single service classes rather multi service classes.[2,3] Meanwhile another approach such as complete sharing scheme (CSS), upper limit scheme (ULS), guaranteed minimum scheme (GMS) is also studied in traditional ATM networks and some wireless ATM networks to support multi service classes.[4,5] However, these schemes do not consider peculial characteristics and handoff in wireless environments. Therefore efficient resource management scheme is required to integrate services with various QoS considering the mobility characteristics. In [6], we propose a dynamic resource management scheme (DCRS) based on mobility. The objective of DCRS is to guarantee the required dropping probability of handoff calls while keeping the blocking probability as low as possible. In this paper, we propose an extended DCRS to support multimedia services with various QoS in wireless communication networks. The performance of the proposed scheme is evaluated by numerical analysis and simulation. The remainder of this paper is organized as follows. Chapter 2 describes the proposed resource management scheme and chapter 3 performs numerical analysis. Chapter 4 analyzes the call level performance by comparing the traditional resource management scheme. Finally, we conclude in chapter 5.

2

Dynamic Resource Management Scheme for Multimedia

Figure 1 shows the wireless resource model of the proposed resource management scheme for multi service class. We assume that total number of wireless resources in a BS is C unit bandwidth. Both handoff and new calls without regard to

CBR VBR ABR CBR VBR ABR

0 New Call Handoff Call

T

C New Call Request Pr. Handoff Call

Fig. 1. Wireless resource model for multimedia

Dynamic Resource Management Scheme for Multimedia Services

3

service classes share equally the normal bandwidth, which are radio bandwidth below the threshold. The guard bandwidth, the remaining bandwidth above the threshold, is reserved preferentially for handoff calls regardless of service classes. Those channels, however, can also be allocated as much as the request probability for new calls instead of immediate blocking unlike GCS. The request probability reflects the possibility that the BS permits each classes of new call to allocate the wireless bandwidth among the guard bandwidth. For this purpose we consider following two circumstances. Case 1 : The arrival rate of handoff calls is larger than that of new calls. The request probability for new calls should be reduced to give more opportunity to handoff calls. Extremely, it must be selected closely to zero in the case that all the requested calls are handoff calls. With this, more wireless bandwidth can be allocated to handoff calls in the guard bandwidth and dropping probability of handoff can be guaranteed. Case 2 : The arrival rate of handoff calls is smaller than that of new calls. The request probability of new calls should be increased to give more opportunity to new calls. Request probability must be selected one for fair assignment between handoff and new calls in the case that all the requested calls are new call. With this, more wireless bandwidth can be allocated to new calls in the guard bandwidth and it has the advantage of reduction of new call blocking probability and increase of the channel utilization. Considering the previous two circumstances, we define the request probability of class i new call in equation 1. It is dynamically determined considering the total number of bandwidth in BS (C), threshold between normal bandwidth and guard bandwidth (T ), current number of used bandwidth (n · b), mobility characteristics (α), and correction factor class i call (Ki ).  ,0 ≤ n · b ≤ T   1 αKi C−n·b (1) Pr,i (n) = , T < n · b ≤ C − bi Cg   0 , C − bi < n · b ≤ C where Cg is the guard bandwidth above the threshold, mobility characteristics α is the ratio of arrival rate of handoff calls (λh ) to arrival rate of new calls (λn ), row vector K = [K1 , K2 , · · · , Kk ] is the correction factor for assigning the channel allocation priority on each classes, and column vector b−1 = [b1 , b2 , · · · , bk ] is requiring bandwidth vector. When Cg is larger than bi , α is positive real, and Ki is positive integer, it can be easily proved that Pr,i (n) ranged from zero to one. Figure 2 shows an example of request probability determined by the proposed formula under C of 125 unit bandwidths, threshold of 100 unit bandwidths, and various call mobility. We also assume that bandwidth requirements of class 1, 2, 3 is 1, 2, 6 unit bandwidth respectively. The request probability increases according to decreasing of mobility characteristics and decreases according to increasing of mobility characteristics under the same network situation. When the mobility characteristics equals zero, the request probability is set to one and all the requests of new calls is admitted like CSS. When the mobility character-

4

D.-E. Lee et al. 1.0

Request Probability

0.8

0.6

0.4

0.2

0.0 100

105

110

115

120

125

Number of used unit class 1 a =0.00 class 1 a =0.50 class 1 a =2.00 class 1 a =10.00

class 2 a =0.00 class 2 a =0.50 class 2 a =2.00 class 2 a =10.00

class 3 a =0.00 class 3 a =0.50 class 3 a =2.00 class 3 a =10.00

Fig. 2. Service probability of new call (K1 = 1, K2 = 2, K3 = 3)

istic is larger than one, the request probability is abruptly decreased in order to provide more service opportunity to handoff calls. If the mobility characteristic is much larger than one, the request probability will be zero like GCS. Request probabilities of each class are different from each other under the same mobility characteristics according to priority level of each class (Class 1 > Class 2 > Class 3). Therefore the proposed scheme has the capability of flexible QoS control by using the mobility characteristics and correction factor.

3

Numerical Analysis

Let the requiring bandwidth of each k classes be column vector b−1 = [b1 , b2 , · · · , bi−1 , bi , bi+1 , · · · , bk ] where bi is the request number of unit bandwidth of class i calls. The unit bandwidth corresponds to a data slot of MAC frame. We define that set of system states is row vector n = [n1 , n2 , · · · , ni−1 , ni , ni+1 , · · · , nk ] where ni is the number of class i calls using the resource. If each of the C units bandwidth is viewed as a server, a class i call simultaneously requires bi servers. At the time of call departure, all bi servers must be simultaneously released. Accordingly, another set of system states can be defined as follows. n± = [n1 , n2 , · · · , ni−1 , ni ± 1, ni+1 , · · · , nk ] We assume that the number of mobile users is much larger than the total number of bandwidth in a BS so that call arrivals may approximate to Poisson process. Following are the traffic parameters used to evaluate the performance of extended DCRS:

Dynamic Resource Management Scheme for Multimedia Services

5

– – – – – –

C : the maximum number of available bandwidth in the BS Cg : guard bandwidth above the threshold bi : requiring bandwidth of class i λh,i : arrival rate of class i handoff calls which has a Poisson property λn,i : arrival rate of class i new calls which has a Poisson property µh,i : service rate of class i handoff calls, in which residence time has a exponential distribution of mean 1/µh,i – µn,i : service rate of class i new calls, in which residence time has a exponential distribution of mean 1/µn,i

From the above assumption, performance metrics are listed in Table 1. Table 1. Analysis parameters 0≤n·b≤T Arrival rate

T < n · b ≤ C − bi

Pr,i (n) = 1, λi (n) Pr,i (n) = [0, 1], λi (n)

C − bi < n · b ≤ C Pr,i (n) = 0, ·

Service rate

ni µi

ni µi

ni µi

Blocking probability

0

(1 − Pr,i (n))P (n)

P (n)

Dropping probability

0

0

P (n)

λi (n) ≡ λh,i + P(n)λn,i β(n), µi ≡ µh,i + µn,i where β(n) = 1 for Pr,i ≥ Random(0, 1), β(n) = 0 for Pr,i < Random(0, 1)

The steady state probability distribution of extended DCRS is given by equation 2 by using the Markovian equilibrium balance equation.  ni k  1  −1 αi (n)G (ΩDCRS ) (2) P (n) = ni ! i=1 i=1 where αi (n) = λi (n− i )/µi , G(Ω) is normalizing constant of state space of Ω and ΩDCRS is the set of admissible state space of extended DCRS given by: ΩDCRS = {n : 0 ≤ n · b ≤ C}. The blocking probability experienced by a class i call is given by equation 3. It is the sum of state probability not included when new call request is issued.

(1 − Pr,i (n))P (n) Pb,i = n∈Bi+

G(Bi+ ) = G(ΩDCRS ) where Bi+ = {n : n ∈ ΩN , n · b > T }.

(3)

6

4.

D.-E. Lee et al.

The dropping probability experienced by a class i call is given by equation

Pd,i = P (n) n∈Di+

G(Di+ ) = G(ΩDCRS ) + + where Di = n : n ∈ ΩH , ni ∈ / ΩH . The resource utilization efficiency is given by equation 5.

n · bP (n) Pu = n∈ΩDCRS C

4

(4)

(5)

Numerical Results and Discussions

In this section, we present numerical examples to evaluate the performance of our extended dynamic channel reservation scheme (DCRS) and two traditional scheme, complete sharing scheme (CSS) and extended guard channel scheme (GCS). Comparisons are conducted in terms of the dropping probability of the handoff call, the blocking probability of new call, and utilization of wireless resources. System parameters used in the analysis are summarized in table 2. Table 2. System parameters Total bandwidth of base station Number of guardbandwidth Offered load ratio of each class Required bandwidth of each class Correction factor of each class Call holding time

125 units 25 units 1:1:1 1,2,6 unit 1,1,1 2 minute

Dropping probability of handoff call, as a function of offered load is illustrated in figure 3. Dropping probability is increased in proportion to the increased of offered load regardless of resource management scheme and service classes. As show in figure, we can observe that both extended DCRS except class 3 and GCS meet the constraints (target dropping probability is one percent) when offered load is 0.8. Dropping probability of class 3 can be reduced by controlling the correction factor and sophisticated control of correction factor is another issue of extended DCRS. In the case of CSS, target dropping probability of class 2 and 3 is not guaranteed and can not be controlled. On the contrary, figure 4 shows that blocking probability of CSS is lower than other schemes, because all wireless resources can be allocated equally by new and handoff calls. Blocking probability of extended DCRS is lower than GCS by providing much room for new calls as much as request probability.

Dynamic Resource Management Scheme for Multimedia Services

25% CSS class 1 CSS class 2 CSS class 3 GCS class 1 GCS class 2 GCS class 3 DCRS class 1 DCRS class 2 DCRS class 3

Dropping Dropping Probability

20%

15%

10%

5%

0% 0

0.1

0.2

0.3

0.4 0.5 0.6 offered loadr)( offered load

0.7

0.8

0.9

1

Fig. 3. Dropping probability (α = 1)

70% CSS class 1 CSS class 2 CSS class 3 GCS class 1 GCS class 2 GCS class 3 DCRS class 1 DCRS class 2 DCRS class 3

Blocking Probability Blocking Probability

60% 50% 40% 30% 20% 10% 0% 0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

Offered Load r) ( offered load

Fig. 4. Blocking probability (α = 1)

0.8

0.9

1

7

8

D.-E. Lee et al.

Figure 5, 6 and 7 shows the dropping probability, the blocking probability and the utilization of wireless bandwidth according to the variation of mobility characteristics of traffic when offered load is 0.9. As shown in figure 5, both GCS and extended DCRS except class 3 can guarantee the target dropping probability. However, even in the case of small mobility characteristics the GCS is satisfied with much higher probability than the requested QoS of handoff calls. It results in not only increased blocking probability of new calls, but also inefficient utilization of wireless channel. This effect can be clearly seen in figure 6 and 7. Figure 6 shows that the blocking probability of new call. Blocking probability of GCS is higher than others. It is because, guard bandwidths are reserved only for handoff calls exclusively, and new call can not use even though guard bandwidth were available. On the other hand, in the case of extended extended DCRS, it can allocate to new calls as much as request probability.

7% CSS class 1 CSS class 2 CSS class 3 GCS class 1 GCS class 2 GCS class 3 DCRS class 1 DCRS class 2 DCRS class 3

Dropping DroppingProbability Probability

6% 5% 4% 3% 2% 1% 0% 0.100

0.125

0.167

0.250

0.500

1.000

2.000

4.000

6.000

8.000 10.000

Mobility Mobility( a)

Fig. 5. Dropping probability (ρ = 0.8)

The influence of traffic mobility on bandwidth utilization is shown in figure 7. In case of GCS, the higher traffic mobility the higher bandwidth utilization. On the other hand, extended DCRS shows utilization efficiency at a nearly constant level regardless of the variant of mobility and improve significantly the utilization performance at low mobility characteristics. This is related directly to the throughput and is important in wireless networks since the radio spectrum has inherent bandwidth limitations.

Dynamic Resource Management Scheme for Multimedia Services

Blocking Probability Blocking Probability

60%

CSS class 1 CSS class 2 CSS class 3 GCS class 1 GCS class 2 GCS class 3 DCRS class 1 DCRS class 2 DCRS class 3

50%

40%

30%

20%

10%

0% 0.100

0.125

0.167

0.250

0.500

1.000

2.000

4.000

6.000

8.000

10.000

Mobility Mobility( a)

Fig. 6. Blocking probability (ρ = 0.8)

78%

Utilization Utilization

76%

74%

72%

70%

CSS GCS DCRS

68% 0.100

0.125

0.167

0.250

0.500

1.000

2.000

Mobilitya ) Mobility(

Fig. 7. Utilization (ρ = 0.8)

4.000

6.000

8.000

10.000

9

10

5

D.-E. Lee et al.

Conclusions

In this paper we proposed extended DCRS to improve utilization of wireless resource. New and handoff calls share equally the normal bandwidth. Even though guard bandwidth are reserved preferentially for handoff calls, they can be allocated to new calls according to the request probability of each classes. The proposed scheme has three main features as follows: First, it operates like GCS if most of the requested calls are handoff calls. Second, it operates like CSS if most of the requested calls are new calls. Third, it operates dynamically according to the change of network situation. Both extended DCRS and GCS were able to guarantee the required dropping probability, but extended DCRS showed lower blocking probability than GCS. This implies that the extended DCRS efficently supports multimedia service with various QoS in wireless communication networks. Acknowlegement This work is supported by Korea Science and Engineering Foundation under Grant 1999-1-302-006-3.

References 1. D. Raychaudhuri, D. Wilson : ATM-based Transport architecture for Multiservices Wireless Personal Communication Networks. IEEE Journal on Selected Areas in Communications. (1994) 1401-1414 2. Yi-Bing Lin, S. Mohan, A. Noerpel: PCS Channel Assignement Strategies for handoff and Initial Access. IEEE Personal Communications, Third Quater. (1994) 47-56 3. D. Y. Hong, S. S. Rappaport: Traffic Model and Performance Analysis for Cellular Mobile Radio Telephone Systems with Prioritized and Nonprioritized Handoff Procedures. IEEE Transactions on Vehicular Technology, Vol. VT-35, No. 3. (1986) 4. G. L. Choudhury, K. K. Leung, W. Whitt: Efficiently Providing Multiple Grades of Service with Protection Against Overloads in Shared Resources. AT&T Technical Journal. (1995) 50-63 5. G. L. Choudhury, K. K. Leung, W. Whitt: An Inversion Algorithm to Compute Blocking Probabilities in Loss Networks with State-Dependent Rates. IEEE/ACM Transactions on Networking, Vol. 3, No. 5. (1995) 585-601 6. Y. C. Kim, D. E. Lee, B. J. Lee, Y. S. Kim. B. Mukherjee: Dynamic Channel Reservation Based on Mobility in Wireless ATM Networks. IEEE Communications Magazine, Vol. 37, No. 11. (1999) 47-51

An Adaptive Handover-Supporting Routing Method for ATM Based Mobile Networks, and Its Adaptation to Ip Scenarios Sándor Szabo and Sándor Imre* Budapest University of Technology and Economics Department of Telecommunications Mobil Communications Laboratory H-1117 Budapest, Pazmany Peter s. 1/D, HUNGARY [email protected], [email protected]

Abstract. In this paper we study the problem of supporting quality-of service (QoS) parameters during a handover event, from the view of the wired network. The future network concepts of the most significant telecommunication companies have three common aspects: a unified IP/ATM backbone, many different kinds of access technologies and QoS support. We propose a new handover supporting routing method, which can be applied to both ATM an IP backbone networks. This method shortens the time needed for completing the handover (or handoff) by the aspect of the wired network, making easier to support real-time sensitive multimedia traffic types. The performance of the proposed scheme is evaluated through simulations. Our simulations show that our scheme provides higher network utilization while achieving smaller handover dropping probability, and smaller signaling latency.

1. Introduction The increasing demand for mobile telecommunication and mobile computing forces the wireless service providers to increase the offered bandwidth for the mobile users: the demand of accessing the Internet with handheld communication devices (such as Personal Digital Assistants and palmtops) via the radio channel while the user is moving became significant. By the improvements made to mobile computing technologies (the capacity and speed of the laptop-sized computers has increased dramatically in the past few years), nowadays even real-time multimedia applications can be used on such devices. This type of multimedia traffic demands short delay variations and sensitive for cell losses. So the new expectations of the mobile users are wide bandwidth and QoS guaranties. In cellular environment frequency reusability, the number of active users and the offered bandwidth can be increased by decreasing the radio cell diameter. This will also increase the system capacity and decrease the required transmit power. When using smaller radio cells, a mobile user This project is supported by OTKA F032268 (Hungarian Scientific Research Found).

*

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 11–19, 2001 © Springer-Verlag Berlin Heidelberg 2001

12

S. Szabo and S. Imre

may cross several cell boundaries during a call. Each boundary crossing implies a handover event. Handover events are consisting of two parts: a radio link related and a wired network related part. The base stations are responsible for the radio channel CAC (Call Admission Control), the new radio channel and/or time slot assignment and adjusting the transmission power of the mobile terminal. The wired network handles the other part of the handover by changing the connection’s path to the new base station, running the CAC algorithm for the wired part of the network and updating the user’s current location. The radio link related part of the handover is often in focus of research activities. Several publications were addressed to this problem and many solutions were published based on the idea of channel assignment and bandwidth reservation, to support handover [1], [2], [3]. Most of the existing schemes are focusing on the handover problem at the radio interface. The novelty of our scheme lies in the fact that we involve the wired network to speed up the handover process. This paper is organized as follows: Section 2 introduces the proposed routing scheme and a brief mobile ATM summary is presented. Section 3 we present the simulator written to examine the performance of the new method and we give a survey of our simulation results.

2. The Proposed Routing Scheme When a handover event occurs, it is the wired network’s task to reroute the connection’s path to the new destination. Three basic solutions can be found in the literature: path extension, COS (CrossOver Switch) technique and complete rerouting [4], [5]. The path extension is simple, fast, but results loops, and non-optimal connection paths. The basic idea of the COS method is the following: a new segment is built up from the new destination to the COS, and the old path between the COS and the source remains unchanged. The COS search is rather complex task, hence it lasts long. The complete rerouting yields optimal path but needs long lasting call setup. The weakness of these scenarios is the interruption they cause to the data flow. A real-time connection can not tolerate such great delays. Our new scheme provides quick connection rerouting ensures loop-free paths and balances the load in the network. The basic idea of the new algorithm is the following: − Some free capacity is reserved on every link of the network. This is achieved through connection diverting. This means that when a link is getting full, some connections are forced to move from this link to a new path, which bypasses the present link. Only non-real-time and non-delay-sensitive connections are diverted from heavily loaded links to links with more free capacity. During a new connection setup, simply the fast OSPF (Open Shortest Path First) algorithm can be used: because of the even load distribution we can be sure, that the load level in other parts of the network is similar to the load of the neighboring links. The result is fast connection setup, because no need for time consuming CAC operation at every network node. This ensures optimal (i.e. shortest, minimal hop number) connection path.

An Adaptive Handover-Supporting Routing Method for ATM Based Mobile Networks

13

− A periodic path optimization is executed for every connection. When the present path of a connection exceeds p2-times the length of the shortest path between the source and the destination, then this path is torn down, and if possible a new one (probably shorter) is built up (p2 is a free optimization parameter). The cause of the path length grow is the above mentioned connection rerouting, or the user movement in the mobile system. If a mobile terminal arrives to a new radio cell, the algorithm waits a given amount of time, to make sure, that the mobile stabilized its position in the new cell. After the waiting period, a totally new path is built up. This optimization ensures the optimal path for the connection’s flows. The first advantage of this method is when a handover occurs, a simple and fast path extension can be carried out. After the path extension, another possible method is not to build up a new path at every handover, just after a certain number of radio cell boundary crossings. This method is especially advantageous in the case of real-time, delay-sensitive high-speed connections. After a handover the new BS measures the length of the current path of the connection, and if it is more than p2-times longer than the optimal path, then it results in a completely new path setup. The periodic optimization also ensures the loop-freeness of the path and prevents forming non-optimal (very long) connection paths. The optimization has a third positive effect: because it diverts non-real-time and non-delay-sensitive connections from heavily loaded links to links with more free capacity, it spreads the load over the whole network evenly. The advantage of this method is the very busy links of the network are relived (because the non-sensitive connections are rerouted to a lighter loaded part of the network), and the system can serve more real-time and delay sensitive connections. This is also favorable for the diverted non real-time connections, because when there is more free capacity on every link of the new – diverted – path, these connections can obtain greater bandwidth – so higher cell rate is achieved. This method is applicable in both ATM and IP networks. Before we could examine the algorithm in detail, a brief ATM review is presented: ATM systems combines the advantages of connection oriented networks (low delay variation, the bytes of the user data is transferred sequentially) and packet switched networks (adaptive to network traffic load). User data (payload) is encapsulated in ATM cells (53 bytes), and transferred through a virtual channel (VC) or virtual path (VP). A single virtual path connection (VPC) can be used to route many virtual channels through the ATM network. ATM networks are fundamentally connection-oriented, which means, that a virtual circuit needs to be set up across the ATM network prior to any data transfer [6]. This connection setup is source oriented. This means that the source has to find an optimal path to the destination (this method is called source routing, it assures loop-free routes and the QoS guaranties). The ATM network is divided into hierarchical layers called Peer-groups (PG). Each member of a PG knows its topology (links and nodes in the PG), the reachable addresses and the amount of free resources in the PG. The periodical flooding ensures that the database at every switch is always up to date. When a switch receives a call setup on his UNI (User Network Interface) interface, the switch calculates a route to the destination ATM end station based on the topology- and link-database of the PG. If the destination is not a member of the current PG, the parent PG is also involved. This GCAC (General CAC) algorithm returns a DTL (Designated Transit List), which is

14

S. Szabo and S. Imre

the sequence of switches form the source to the destination. This route can guarantee the desired QoS parameters of the connection. When the call setup message travels via the DTL, every switch ensures that the required capacity is available at the moment. This process is called ACAC (Actual CAC). When the destination receives and accepts the call setup message, it sends back a receipt message. The receipt message travels backward along the DTL. After this call setup process, the path is ready for data communication. Now we can examine the detailed operation of the new method. In the network, when a link is getting fully loaded, the switches at the end of the link decide to divert a connection. Equation (1) gives the probability of diverting a connection. x

e a −1 p( x) = b .

(1)

where x is the load of the link and p(x) refers to the non-linear transformation of x to the [0...1] range, therefore p(x) likes a probability variable. The parameter a adjusts the slope of the curve, therefore adjusting the border of the light loaded region. In the light-loaded region, the algorithm does not detour connections very likely. By increasing this value, the algorithm becomes more “aggressive”, so the detouring starts earlyer. Parameter b is used to normalize the function to the [0...1] range. The effect of the parameters can be seen in Fig. 1.

The p(x) func tio n 1,2

p(x ) va lue

1 0,8 0,6

a =10, b=22025

Light loaded region

a =20, b=150 a =30, b=28

0,4 0,2

0 10

90

80

70

60

50

40

30

20

10

0

0

Lo a d le ve l [%]

Fig. 1. The effect of the a and b parameters in equation 1. By modifying the parameters, the algorithm becomes more aggressive.

The reason for the non-linear transformation is the following: at low traffic (light loaded region), we do not need to divert any connections, but when the load

An Adaptive Handover-Supporting Routing Method for ATM Based Mobile Networks

15

approaches the link capacity, the probability of a diversion increases exponentially. At stated intervals every switch decides according to the value of p(x), whether it should divert a connection. (The time interval is adaptive to the link load; at higher load level, it becomes shorter). The point of using function p(x) is that the algorithm is more adaptive to link load, and can achieve better bandwidth utilization than using a given threshold limit. Our new method requires the introduction of a few new signaling elements in addition to the ATM PNNI signaling system: 1. CONNECTION_LOCK, it ensures, that only one switch (at the end of the link) diverts a given connection at a time. 2. LINK_STATE_QUERY, in response to this message, the neighboring switches return the load level of their links. This is vital for a switch to choose the minimum loaded alternative path. 3. DIVERTING, this message modifies the routing tables in the affected switches. This message includes the ID of the initiating switch and the VPI/VCI number of the affected connection. The algorithm uses the ATM traffic class descriptor to select the suitable connection for diverting. The following types of traffic are suitable for diverting: UBR (Undefined Bit Rate), ABR (Available Bit Rate), VBRnrt (Variable Bit Rate). These traffic types do not specify the CDV (Cell Delay Variation) and the CTD (Cell Transfer Delay) parameter, so these connections are appropriate for diverting to a longer path. In case of heavy loaded neighbor links, the system could divert the same connection repeatedly from one link to another and inversely. To deal with this problem, the switch registers the path of the last diverted connection, and if further diversion is needed – because of the high load of the newly selected neighboring link – the new path of the connection can not be the same as the former one. Therefore the path of the connection soon evades the busy part of the network. The new scheme does not require central call processing, it can be realized in a fully distributed manner. The information needed by the algorithm could be obtained from the standard ATM SETUP messages (i.e. ATM traffic descriptor, broadband capability, DTL) and by monitoring the load of the switches’ links. This routing method is also applicable for IP based mobile networks. The basic idea of IP flows (RFC 2460) is similar to the VC/VP concept of ATM [7]. An IP flow can be regarded as a sequence of packets sent from a source, using a particular hostto-host protocol for the transmission of data over the Internet, with a certain set of quality of service requirements. These flows can be manipulated by means of our algorithm in the same a manner as the ATM connection paths.

3. Simulation and Results Simulations were performed to examine the efficiency of the new scheme in a small ATM based mobile environment (see Fig. 2). The core networks consists of regular ATM switches (referred as network nodes), the access network utilizes mobility enhanced ATM switches.

16

S. Szabo and S. Imre

2 7

1

3 10

6 4

12

5

16 9

14 11

15

ATM switch Network node

Base station

Fig. 2. The test network. The core networks consists of regular ATM switches, the access network utilizes mobility enhanced ATM switches connected to the base stations.

The simulation was written in C programming language. The program uses randomly moving users with 12 different traffic classes. The typical applications (e-mail, ftp, http session) are mapped to these traffic classes. The performance of the new scheme was compared to the standard operation of an ATM network in a mobile scenario. Fig. 3. shows the flow chart of the algorithm. The first part of the algorithm monitors the link loads, and if the load is greater than parameter p1, it searches a new path for one of the non-real time connections of the given link. A procedure named ROUTE provides the new path (or just a path segment) based on the input parameters (source and destination switch number, required traffic parameters). If this path setup is successful, the connection is diverted to the new path, and the old one is torn down. The second part of the algorithm is responsible for preventing the forming of nonoptimal connection paths. It periodically calculates the shortest path between the source and the destination for every connection. If the current path is more than p2 times longer than the shortest possible path, the algorithm tries to reroute the connection to the shortest available path. The result show that the average load in the network has became equal. The maximum difference of the link loads - compared to the average link load - is less than 20 % in the case of the new algorithm. The standard ATM network shows bigger deviations with a maximum of 60 percentage. (See Fig. 4) The number of successful call-setup and successful handover are increased by 5% compared to the traditional method. The ratio of the accepted real-time connections has risen compared to the original scenario. The time needed for signaling is also reduced. This is very advantageous from the view of real-time connections. The

An Adaptive Handover-Supporting Routing Method for ATM Based Mobile Networks

17

ST ART

FOR I=0 T O LIN K_ NU M

N EX T I

FOR M=0 T O CONN _N U M

L INK[I].LOAD >P1

N EX T M

CO N N[M].L EN G HT >P2* MIN_ LE NGH T(CON N[M ])

n y FOR J=0 TO LINK_NU M

N EX T J RO U TE (CO NN[M].SO URCE , CON N[M ].D EST )

L INK[I] ╬ C ON N[J].PA T H A ND CO N N[J].CO N NT YPE =N RT

n RO U TE = = TRUE

y

n y

RO U TE (CO NN[J].PATH [X -1], CO NN [J ].PAT H [X+1]) BU IL D _N EW_PA T H

*C ON N[J].PA T H[X] = = I

D EL _O LD _PA TH

RO U TE = = TRUE n y A DD _NE W_SU BPAT H

E ND D EL _O LD _SU BPATH

Lo ad ba lancing

Length optimization

Fig. 3. Block scheme of the simulator. The .load balancing and the length optimization processes are repeated periodically.

L o a d d is p e rs io n (0%= a ve ra g e lin k lo a d )

60% 40% Load [% ]

20% 0% -20%

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

-40% -60% -80% Link N o. convetnional

new m ethod

Fig. 4. Link load deviation in the network (0% is the mean load level). Every bar represents the load deviation of a link. The longer the bar, the bigger is the underload/overload of the given link (the link number can beinseen bars). signaling time decreases theunder case the of the new method due to the lack of actual CAC,

18

S. Szabo and S. Imre

signaling time decreases in the case of the new method due to the lack of actual CAC, because the general CAC method itself can support enough information on the call setup. The more successful handovers are resulting more active connections and bigger network load in case of the new method. The other reason for the average network load rising is that the longer (diverted) connection routes consume more resource in the network. An interesting question is the maximum improvement, which can be achieved by the algorithm. To give an absolute coefficient of improvement, the effect of the traffic type varying and the different user movements has to be eliminated, because the measured values are depending on the generator traffic matrix, and user movement properties. We have used random chosen traffic types, and random user movement patterns to minimize the effect of different traffic and movement properties. By running the simulation several times, the results are closing up to the real life scenario. The simulations have shown that the algorithm’s performance falls back at very high level (above ~95%) of network load. The reason for this effect is the additional load caused by the detouring method, but the detouring would not help either, it only causes some extra load. The solution to this problem is the modification of the p(x) function, to adopt a fall-back characteristic at very high level of network load. Table 1. Simulation results.

connection setup success successful handoffs Signaling time Load/connection Average network load

No optimization 78 % 66 % 11.5 70.7 63 %

New algorithm 83 % 71 % 10.3 82.7 76.79 %

Gain + 5% + 5% - 1.2 + 12 + 14%

4. Conclusions and Future Research A new handover supporting routing scheme for mobile networks was presented. Our algorithm provides faster handover and more even network load. The growing number of successful handovers – achieved by our method – increases the users’ content. We used large number of simulations to investigate the performance of the new method, and the results proved the effectiveness of our algorithm. An extension to mobile IP networks is also introduced. We are planning to study the performance and effectiveness of the scheme applied to IP flows.

An Adaptive Handover-Supporting Routing Method for ATM Based Mobile Networks

19

References [1] D.Cox and D. Reudink, “Increasing channel occupancy in large-scale mobile radio systems: Dynamic channel reassignment, ” IEEE Trans Commun., vol. COM-21, Nov 1973 [2] S. Chia, “Mixed cell architecture and handover,” in IEEEColloquium – Mobil Commun. in the year 2000, London, U.K., June 1992 [3] C. Oliveira, Jaime Bae Kim, T. Suda, “An adaptive Bandwidth reservation scheme for high-speed multimedia wireless networks”, IEEE Journal on sel. areas in comm., vol. 16, NO. 6, August 1998 [4] Anthony S. Acampora, and Mahmoud Nagshineh, “An Architecture and Methodology for Mobile-Executed Handoff in cellurar ATM Networks,” IEEE, 1994. [5] Gopal Dommety, Malathi Veerarghavan IEEE, Mukesh Singhal, "A Route Optimalization Algorithm and Its Application to Mobile Location Management in ATM Networks", IEEE, 1998. [6] Private Network-Network Interface Specification Version 1.0 (PNNI 1.0). The ATM forum Technical Committee (af-pnni-0055.000), 1996. [7] RFC 2460, “Internet Protocol, Version 6 (IPv6) Specification”, www.ietf.org, 2000.

Location Stamps for Digital Signatures: A New Service for Mobile Telephone Networks Matthias Kabatnik1 and Alf Zugenmaier2 1

2

Institute of Communication Networks and Computer Engineering, University of Stuttgart, Germany, [email protected] Institute for Computer Science and Social Studies – Dept. of Telematics, Albert-Ludwigs-University Freiburg, Germany, [email protected]

Abstract. Location aware services are expected to make up a large share of the mobile telephone market in the future. The services proposed so far make use of uncertified location information—information push services, guidance systems, positioning for emergency calls, etc. We propose a service that provides certified location information. Integrated with cryptographic digital signatures this service enables the determination of the current position of the signer in a provable way. Such certified location information—called location stamp—can be applied in electronic commerce, e.g. for determination of applicable laws or taxes.

1

Introduction

The benefit of modern cellular telephone networks is the ability of users to roam with their terminals being reachable at all times. The underlying system needs information about the user’s location to be able to route calls to the mobile terminal. This information is provided by maintaining special registers that store information about the area and the cell where the user is located. In cellular mobile communications networks like the GSM network the traffic volume is increasing steadily. However, the number of simultaneous calls per cell is limited. Therefore operators shrink cell sizes—at the hot spots like airports and train stations even down to picocells (several tens of meters in radius)— in order to keep up with the growing number of call attempts. Thus, location information of the mobile stations in the network becomes more accurate and enables services like location depended charging (low tariff in the so-called home zone). Other regulatory requirements (for example by the FCC) demand even more precise location information, e.g. to provide better emergency call response services. Therefore, mobile terminal tracking methods like triangulation with higher precision have been developed. With the availability of precise location information new services are possible. One application of location information in daily business is signing of contracts. The location of signing may determine to which jurisdiction the contract is P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 20–30, 2001. c Springer-Verlag Berlin Heidelberg 2001 

Location Stamps for Digital Signatures

21

subject to. When manually signing a contract, it contains the location, the date, and the hand-written signature. The written location can be verified immediately since both contract partners are present; in an electronic commerce setting this location of the conclusion of a contract, i.e. where it is signed is not evident. How can one be sure where the partner is located? We designed a new service that provides an approved location stamp bound to a digital signature in order to map the process of manual contract signing to modern communication systems. Additionally, we present a procedure that assures the correct mapping of the communications system’s view on a mobile terminal to a user requesting a location stamp. In order to provide liability we make use of digital signatures based on asymmetric cryptographic algorithms. The remainder of this paper is organized as follows: First we describe the service and the technical entities required to generate a location stamp that can be tied to a digital signature. In chapter three we show the protocol that can be used to perform this. In the next chapter we map this generic description to the functional and organizational entities of the GSM networks to show the feasibility of the service. Chapter five discusses security aspects of the protocol and shows its limits. The related work is presented in chapter six, and finally a summary is given.

2

Service Specification

The location stamp service (LSS) provides a location stamp which certifies at which position the subscriber is located when making a signature—or rather, at which position the subscriber‘s mobile station is visible to the network. This location stamp can be verified by any third party using the public key assigned to the LSS, and it can be used as a proof of the location information. In this scenario the service operator who signs the location is a trusted third party (i.e. the signer is neither the principal of the stamp nor the verifier of the stamp). 2.1

Location Measurement

There are two main types of location measurement: positioning and tracking. Positioning is a measurement which is performed within the mobile device (e.g. by an integrated GPS receiver). The calculation of the position is also done in the mobile device. The other type is tracking: Some external measurement infrastructure determines the position of the mobile device (e.g. by triangulation using the mobile’s emitted signal). Positioning has the advantage of greater accuracy, privacy of location information, and – for security critical applications like proving a location via a telecommunication channel – the disadvantage of requiring tamper proof hardware, and resistance against misleading the device with a fake environment like a GPS simulator. Tracking has the disadvantage of lower accuracy, possible loss of privacy against the network, but the advantages of being harder to deceive. In our approach we have chosen tracking because it offers better security and because of its straightforward implementation: tracking information is available

22

M. Kabatnik and A. Zugenmaier

in a cellular telephone network since the location information is needed for routing and billing purposes. 2.2

Cryptographic Capabilities

The handwritten signature can be replaced by the digital signature in electronic commerce (e.g. [1]). A digital signature using asymmetric (public key) cryptography is created by calculating a hash of the document to be signed and encrypting this hash with the private key of the signer [2]. The signature can be verified by anybody who knows the public key of the signer. The private key has to be kept secret by the signer. To bind a public key to an identity, a certificate according to a standard like X.509 [3] is used. This certificate is signed by a certification authority that guarantees the fact that a certain public key belongs to the identity named in the certificate. Next to the need of identification of users signing a contract there is the necessity to identify terminals within a network. This identification is needed to perform routing, addressing, and billing tasks. In mobile networks usually authentication mechanisms are provided to prove the terminal’s claimed identity. Therefore, a mapping between the identity and some secret exists—usually a symmetric key—that must be known by the network. We will use a generic identifier called MoID (Mobile IDentifier) and a secret key named K. 2.3

Binding Signature and Authentication

From the perspective of the network, only a terminal named by a non-ambiguous MoID can be located in the network. Because the task in our scenario is to certify that a certain person signs a document at a certain location, it is necessary to bind the capability to authenticate the user’s identity to the same physical entity that is used to authenticate the identity of the mobile terminal. This can be done, e.g. by placing the private signature key and the key K corresponding to MoID on the same tamper resistant chip card. The chip card should also provide the capabilities for authentication and signing to prevent the keys from ever leaving the physical module. When both operations (proof of user ID with a signature and authentication of MoID) are performed at the same time, they must be performed at the same place. Thus, the location of the terminal is identical with the place of signature. The physical binding of the two keys can be represented by a digital certificate issued together with the chip card.

3

Protocol

The location stamp protocol consists of six information flows which may consist of several messages each (e.g. in case of fragmentation or necessary acknowledgments). First the abbreviations are introduced, then the protocol itself is presented. The abbreviations used are:

Location Stamps for Digital Signatures MS

LSS

LMS

Calculation of H LocationStampRequest

1

(H, MoID, Resolution) Generation of Nonce

2

SignatureRequest ({MoID,Nonce,H}SigLSS )

Verification SignatureResponse ({Nonce,H}SigS, Cert{MoIDKSpub} )

3 Verification LocationRequest

4

(MoID)

5 LocationResponse Generation of Location Stamp

6

(LocInf)

LocationStampResponse ( {{Nonce, H}SigS, LocInf, Time, ID_LMS}SigLSS )

Fig. 1. Successful run of LSS protocol

MS LSS LMS H MoID KSpub {...}SigS

mobile system location stamp service location measurement system hash value mobile’s identity public key corresponding to the private key of the subscriber signature of the data in parenthesis with the private key of the subscriber {...}SigLSS signature of the data in parenthesis with the private key of the location stamp service ID LMS identifier of the applied location measurement system (LMS) An example of a successful protocol run is presented in Fig. 1.

23

24

M. Kabatnik and A. Zugenmaier

The following explanations will refer to an information flow (IF) depicted by an arrow, and its preceding operation block (if any). IF 1: The hash of the document is calculated. This can happen at any place at any time before the run of the protocol since the hash is simply another representation of the document that shall be signed. Thus, this calculation does not necessarily have to be performed within the mobile device. The mobile device initiates the protocol run by sending a service request to the service. The request contains the mobile’s ID and the hash. The hash is included to provide some additional information for preparing the operation of IF 3. The communication between mobile and service can be settled on any kind of bearer service that is available. Additionally, the mobile supplies the desired resolution for the location stamp. IF 2: The service generates a nonce value. A nonce is a kind of random value which may contain some time dependent information (e.g. 8 time related octets and 2 random octets). This value is used to prove recentness within the protocol [4]. If the mobile can generate a signature containing this nonce value, the service can derive that the counterpart has been alive after the reception of message 2. The message in IF 1 alone does not give this information since it could be a replay or a complete fake. The signature provided by the service is necessary to ensure that the nonce was produced by the service. Additionally the hash value within the message can provide the same effect like the nonce if it is unique (in cases when one document has to be signed several times an additional nonce value is necessary to protect against replay attacks). The signed nonce is sent to the mobile. IF 3: First the mobile checks if the parameters H and MoID are the same as in IF 1. If this is not the case, no time consuming cryptographical operation has to be performed, the message can be discarded immediately, and the protocol terminates with an error. If the parameters fit, the signature of the service is validated. Now the mobile knows that the nonce was generated by the service and shall be used for signing the document represented by H. The mobile signs the concatenation of the document’s hash H and the nonce, and sends the signature back to the service. Additionally, it may provide a certificate which can be used to prove the physical binding of the secret key belonging to its signature key KSpub and the MoID. In order to reduce the amount of information that is transferred, this certificate may also be stored at the LSS. IF 4: The LSS verifies the signature of the mobile to be sure of the origin of the value. Since the signature contains the nonce, it can be derived that it is fresh. The key used to produce this signature is located inseparably from the authentication mechanism of the MoID, therefore the service must locate the corresponding mobile station. The LSS prompts the location measurement system for the location of the mobile... IF 5: ... and receives the location information. IF 6: The LSS generates the location stamp by expressing the received location information with the accuracy requested by the mobile system in step

Location Stamps for Digital Signatures

25

1 (resolution parameter). Additionally, the point of time is provided. The parameter ID LMS is included to enable any verifier of the signature to apply his own estimation of the trustworthiness (cf. section 5.1). Finally, the mobile receives the requested location stamp.

4

Mapping onto the GSM Infrastructure

The GSM system, standardized by the ETSI in 13 series of standards [5], is used primarily in Europe and Asia. It has a share of about 65% of the world’s digital cellular telephone networks. Two types of mobility are supported by the GSM system: mobility within a network and mobility across networks (roaming). The location information that handles the mobility inside a network is stored in the visitor location register VLR of the network the mobile station is currently booked into. The home location register HLR in the network of the provider is used to store information about which network the subscriber is currently using. It also stores personalization parameters of services of the subscriber. GSM enables subscriber mobility in a sense that different subscribers may use the same terminal. To bind a device to an identity, a subscriber identity module (SIM) is used. It is generally placed in a chip card or module that can be plugged into different terminals. On the SIM card the international mobile subscriber identification (IMSI), a 15 digit number, is stored. To address this subscriber, a mobile station ISDN number (MSISDN) is used. More than one MSISDN may be assigned to a subscriber identified by the IMSI. Location information in the GSM network arises naturally: it is necessary to route a call to its destination. This information has a resolution of the cell size. In the GSM standard [6],[7] a location service (LCS) is described that permits a more precise measurement. A location service client may request the location of a subscriber that is identified by its IMSI or MSISDN. The location service can communicate with the location measurement units through the mobile switching centre (MSC) to locate the terminal device and return the current position to the LCS client. 4.1

Location Stamp in GSM Networks

We propose the following mapping of the technical entities of the protocol as described above to the entities that are available within the GSM system: The IMSI takes the role of the MoID. The public key of the subscriber (KSpub ) can be stored on the SIM card. This enables the network operator of the subscriber to issue a certificate that states the physical binding between the IMSI and KSpub . The HLR has knowledge which network the mobile station is booked into. The MSC of this network can contact the location measurement units which can in turn locate the mobile. The location measurement itself depends on the desired resolutio n: it is either possible to just locate the cell the mobile is booked into—this can be performed with a lookup—or perform a measurement, e.g. based on time of arrival of a signal emitted from the mobile station

26

M. Kabatnik and A. Zugenmaier

b

VPLMN

a

HPLMN

MS

LMU

6

c 4c MSC

1,2,3

LSS

4a,4b

HLR

5

Fig. 2. Request for a location stamp by the mobile station. The figures and letters correspond to the information flows

at two or three base stations. The measurement itself is performed by location measurement units, the result is calculated by the location service (LCS) server. As a transport protocol for the connection between the terminal and the LSS Unstructured Supplementary Service Data (USSD) or even Short Message Service (SMS) can be used. In Fig. 2 the entities and the information flows between them are depicted. In Fig. 3 a trace of a successful protocol run in the GSM network is shown. The information flows are: IF 1, 2, 3: Same as in chapter 3. The communication between mobile and service can be settled on any kind of bearer service that is available (e.g. GPRS, USSD). The certificate binds the public key KSpub to the IMSI, thus stating that the private key K−1 Spub is stored on the SIM card corresponding to the IMSI. In the case of GSM the retrieval of location information (IF 4 of Fig. 1) maps to several IFs denoted by an appended letter (a, b, c). IF 4a: The LSS verifies the signature of the mobile to be sure of the origin of the value. Since the signature contains the nonce, it can be derived that it is fresh. Since the key used to produce this signature is located inseparably in the SIM with the IMSI assigned, the service must locate the corresponding mobile station. The LSS prompts the HLR for the location of the mobile station ... IF 4b: ... and the HLR provides the routing address of the MSC currently serving the mobile, which is indicated in the data base entry indexed by the IMSI. IF 4c: The LSS assesses this MSC address. The VPLMN may not support location services, or the LSS provider may not consider it to be trustworthy either for its poor protection of secrecy and integrity (possible manipulation of location data) or simply for the provided accuracy of the location information. In the latter case the LSS aborts the request by sending an error message to the mobile. However, if the MSC supports location services and is considered to be trustworthy the location information request is sent to the MSC in the immediate mode (only minimum delay between request and response is acceptable) which in turn uses the infrastructure of the VPLMN to perform the necessary measurements. We assume that all necessary steps like encryption or physical separation of network links are taken to protect

Location Stamps for Digital Signatures MS

LSS

HLR

1, 2, 3

LocationRequest

same as in Fig. 1 with MoID = IMSI

(IMSI)

4b

27

MSC

4a

LocationResponse (VLR)

Mapping of VLR to LCS server LocationServiceRequest (IMSI, immediate)

4c Requesting LMU

a, b, c 5

LocationServiceResponse (LocInf)

6

Generation of Location Stamp same as in Fig. 1

Fig. 3. LSS service in a GSM environment

the integrity of the communication between LSS and the infrastructure of the VPLMN. IF a, b, c: The MSC determines the location involving one or more location measurement units (LMU) IF 5: The MSC sends its answer to the LSS. IF 6: The LSS generates the location stamp by expressing the received location information with the accuracy requested by the mobile system in step 1 (resolution parameter). Additionally, the point of time is provided. The parameter ID LMS is included to enable any verifier of the signature to apply his own estimation of the trustworthiness of the LSS and the VPLMN. Finally, the mobile receives the requested location stamp. In case the protocol cannot terminate successfully, an error is returned. There are two general types of errors: protocol internal errors and protocol external errors. Protocol internal errors are related to the information flows 1-6. It is possible, that a message is not received in time or that some verification fails. In this case typical error messages can be generated and delivered to the participants of the protocol run. Protocol external errors are related to the process of location measurement (IF a, b, c in the GSM example). These errors might be caused by either a negative judgement of the LMS with respect to the security qualities of the responsible LMS or simply by unavailability of location information with the desired accuracy. In cases low resolution information is available the LSS can

28

M. Kabatnik and A. Zugenmaier

negotiate with the requester and thus, recover from the error condition. In all other cases the protocol terminates without a stam p being delivered.

5

Security Considerations

Some reasoning about the security of the protocol has been given in chapter 3. In this section we discuss two additional security aspects of the service. Firstly, the trust model which can be expressed by assumptions made by the involved parties. Secondly, the possibility of subverting the service by tunnelling information. 5.1

Trust Model

When a location stamp is presented to an acceptor A, she may or may not accept the location stamp according to her trust in the parties involved in the provision of the stamp. The parties involved depend on the selection of the LSS by the requester of the stamp and the LMS in charge. In case of GSM the LMS depends on the network a mobile device is booked into. While the number of possible LSS with respect to a certain subscriber is rather limited (e.g. the LSS of the HLMNP of the GSM subscriber) the number of possible LMS can be large. Therefore, it is appropriate to look at trust in the LSS and the LMS separately. Informally A trusts B concerning some action if A expects B to behave accordingly (with an acceptable probability). Yahalom et al. give a classification scheme of trust in [8]. They provide an open list of classes of trust like providing good quality keys (kg) or Provide identification of one entity to another (id). We extend this list by the class of Providing correct location information (cl)1 . If there was no indication of the source of the location information contained in the stamp, the acceptor of a location stamp would be forced to trust the LSS to provide good location information. Since the LSS includes the ID LMS in the stamp it states implicitly a recommendation regarding the cl-property of the LMS. By making the source of the location information visible, the acceptor A is enabled to restrict the set of possible location information sources. Thus, A can define a set SLSS of LSS, from which she is willing to accept stamps and recommendations, and—for each LSS—a set SLMS of LMS that she is willing to rely on. An example of these restrictions could be the following: an acceptor A might think of a GSM network operator, who offers LSS1, that he has good insight in the technical quality of the location services (LCS) of the GSM networks that have roaming agreements with him. Thus, A accepts any recommendation of LSS1, i.e. any stamp issued by LSS1 with any source of location information will be accepted by A. In case of another operator, who may be new in the market, A restricts his trust in the recommendations of LSS2 to the LCS of the operator’s own network. 1

The term correctness comprises accuracy and correlation between location information and given identity of the located subject, thus implicitly containing the id-property.

Location Stamps for Digital Signatures

29

There are other aspects of trust, we do not discuss in detail, since they are not visible to the acceptor A and therefore, she has to trust the LSS with respect to these points completely. To give some examples: A has to trust the LSS with respect to correctly authenticating the signature key corresponding to KSpub . The LSS has to trust the issuer of the certificate used to establish the relation between MoID and KSpub . In case of GSM the LMS has to trust the HLR and authentication centre (AuC) to provide correct challenges for the authentication of the mobile. All entities have to trust the used signalling network infrastructure to provide secure communication channels. 5.2

Relay Problem

When locating a certain mobile device, it is of importance, that the tamper resistant chip card is at the point of visibility, i.e. in the located device. If an attacker uses a manipulated mobile phone, which is able to tunnel the chip card’s interface via another communications media to another place, this assumption is false and the system is subverted. In cases when this attacker scenario is relevant, additional mechanisms have to be provided. One possibility can be fraud detection systems, which can detect impossible changes of a subscribers location (e.g., a mobile booked into a network in Scotland and signing some data in southern France at almost the same time). Another possibility is using more sophisticated physical measurements (e.g. response time limitation), which are beyond the focus of this paper. If this relay attack were staged, a physical presence of at least an air interface at the location to be spoofed is necessary. Evidence of this may be traceable at a later point of time.

6

Related Work

Other location aware services in the public land mobile network, like integration in intelligent transport systems [9], or road maps and directories [10] use the current location that is not certified by a third party. In certificates that are used for commercial transactions [3], the place of residence can be certified, but not the location where the current transaction takes place. Tang, Ruutu, and Loughney briefly discuss the problem of lack of trust between different parties exchanging location information. They state the necessity of a trusted third party involved in the protocol [11]. A security relevant application of the location information is described in [12], where GPS is used for positioning an authentication device. The location information is then used as additional authentication information to decide whether access should be granted. In the Internet increasing demand for locating the visitors of a web site has led to other location services. For example, the company quova.com [13] offers location information based on IP addresses for marketing purposes. Again this location information is not certified and the location information does not really state the position of the web surfer, it can only locate the last proxy the connection goes through.

30

M. Kabatnik and A. Zugenmaier

Enhancing the digitally signed documents with a location stamp is similar to adding a time stamp to it. Different standards exist, one of them is the PKIX draft [14].

7

Summary

We have presented a new type of service enhancing the capabilities of mobile communication terminals. Extending digital signatures with location stamps provided by a trusted third party can be used to improve electronic commerce applications. Additionally, the new service enables other applications like electronic travel logs or proof of service for field staff. We have proposed a service architecture which can be realized with existing telecommunication networks. Therefore, only limited effort has to be taken to bring the service into existence.

References 1. Directive 1999/93/EC of the European Parliament and of the Council: A Community Framework for Electronic Signatures, December 1999 2. D. W. Davies and W. L. Price: The Application of Digital Signatures Based on Public Key Cryptosystems, Proceedings of the Fifth International Computer Communications Conference, October 1980, pp. 525–530 3. ITU-T Recommendation X.509 Data Networks and Open System Communications – Directory – Information Technology – Open Systems Interconnection – The Directory: Authentication Framework, Geneva, June, 1997 4. Lowe, G.: A Hierarchy of Authentication Specification. In Proceedings of the 10th Computer Security Foundation Workshop. IEEE press, 1997 5. GSM 01.01: Digital cellular telecommunications system (Phase 2+); GSM Release 1999 Specifications, ETSI TS 101 855 6. GSM 02.71 Digital cellular communication system (phase 2+); location services; service description, stage 1, ETSI TS 101 723 7. GSM 03.71 Digital cellular communication system (phase 2+); location services; functional description, stage 2, ETS 101 724 8. Yahalom, R.; Klein, B.; Beth, Th.: Trust relationships in secure systems – a distributed authentication perspective. In Proceedings of the IEEE Conference on Research in Security and Privacy, pages 150–164, 1993 9. Shibuya, A.; Nakatsugawa, M.; Kubota, S.; Ogawa, T.: A high-accuracy pedestrian positioning information system using pico cell techniques; In: IEEE 51st Vehicular technology conference proceedings, Volume 1, pages 496–500, spring 2000 10. Hu, Yun-Chao: IMT-2000 mobility; In: Proceedings of the IEEE Intelligent Network workshop 2000, pp. 412–435, 2000 11. Tang, H.; Ruutu, J.; Loughney, J.: Problems and Requirements of Some IP Applications Based on Spatial Location Information, IETF draft ¡draft-tang-islf-req00.txt¿, 2000 12. Denning, D.: Location-Based Authentication: Grounding Cyberspace for Better Security, Computer Fraud & Security, Elsevier Science, February 1996. 13. www.quova.com 14. Adams, C.; Cain, P.; Pinkas, D.; Zuccherato, R.:IETF draft , December 2000

A New Method for Scalable and Reliable Multicast System for Mobile Networks 1

2

Masato Hayashi and Christian Bonnet 1

Corporate Technology Group, Hitachi Europe, Ltd, c/o CICA, 2229, Route des Cretes, 06560 Valbonne, France Tel. +33(0)4-9294-2569 Fax. +33(0)4-9294-2586 [email protected] 2 Mobile Communications Department, Institute Eurecom 2229, Route des Cretes, B.P.193, 06904 Sophia Antipolis, France Tel. +33(0)4-9300-2608 Fax. +33(0)4-9300-2627 [email protected]

Abstract. This paper proposes a new method aiming at realizing a scalable and reliable multicast system focused on mobile network. For reliability, retransmission scheme was adopted. The main idea of the proposed method is that network node does take care of error recovery by retransmission instead of a sender or receivers by which conventional methods have been done. Consequently terminal mobility can be dealt with more simple. This paper shows that the proposed method has much better performance compared with existing methods through simulation.

1

Introduction

Recent rapid advance of mobile communications technology allows users in mobile environment to enjoy not only voice service but also the Internet. And especially the enlarging capacity of wireless link makes it possible to accept the communication with large amount of data (file, picture and video, etc.) [1]. In these days, one of the main services is sure to be delivery-type service of, for example, music, game software and so on, to many mobile terminals (MT) utilizing the Internet. The purpose of our study is to develop a new method suitable for this kind of service over mobile network. To realize delivery service, network must support some characteristics. First is an efficient data routing. Multicasting, which provides a very efficient routing way of one-to-multipoint communication, is suited to delivery service very well. Many kinds of multicasting protocols have been developed [2][3]. Data generated by the sender runs over the multicast tree that was organized in advance by the existing multicasting P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 31–40, 2001 © Springer-Verlag Berlin Heidelberg 2001

32

M. Hayashi and C. Bonnet

protocol to group members. The second is reliability that is to guarantee error-free in the sending data at all receivers. There are two classified techniques for reliability. One is feedback-less scheme, which adds to the multicast data, some redundant information so that receivers could correct the erroneous data using the redundant information. The other is feedback (reception state report) scheme; retransmission which sends again the same data to the erroneous receivers. Our concern is on feedback approach for complete (high) reliability. The third is high scalability, which is to be able to deal with extremely many mobile receivers with connection to networks, is essential to the service. The last is terminal mobility that is to guarantee the continuation of service session for moving receivers. There are already several scalable and reliable multicast protocols with retransmission for reliability. They address the scheme to avoid implosion problem, which is caused by swamping on a sender with feedback messages from all receivers, in order to obtain scalability. SRM (Scalable Reliable Multicast) [4] proposes the random delay feedback scheme with multicast to reduce the implosion on the sender. A receiver suppresses its feedback after its random time passed if another receiver responds the same feedback. A successful receiver retransmits the data for erroneous MTs. PGM (Pretty Good Multicast) [5], LGMP (Local Group Multicast Protocol) [6], RMTP (Reliable Multicast Transport Protocol) [7] [8] and MESH protocol [9] employ local group (LG) concept to avoid the implosion and aim at shorter delay on recovery. In these methods a multicast group is divided into several LGs for local recovery. The main difference exists on the way to define LG and determine local controller (LC) of the group for the recovery. In PGM, error-free receiver volunteers to become LC. Hence LCs dynamically changes. On the other hand, LGMP, RMTP and MESH adopt fixed LC scheme. That is, LC is pre-defined depending on the multicast service type and network topology. MESH protocol [9] is targeted on the specific application of time-constrained data streams. Therefore, high reliability could not be gained since it protects delay-sensitive stream against errors. As shown so far, the conventional methods can provide scalable and reliable multicast system. However, no consideration for mobile environment in these existing methods causes following the problems. For example, the low capacity of the wireless link between network and LC does not always lead to efficient recovery. The movement of LC could make local recovery complex. Consequently, these conventional methods do not have aspect to meet the described requirements. This paper provides a new method of scalable and reliable multicast system not only for fixed networks, but also for mobile networks. Rest of the paper is organized as follows. Section II shows the conventional approach and discusses its characteristics. Section III presents the new method in detail. In the Section IV, the evaluation of the new method is shown through comparing to conventional methods by computer simulation. Finally, Section V describes the concluding remarks.

2

Conventional Approach and New Approach

Regarding the existing method, we categorized existing methods into two types of approach with respect to who does take care of recovery.

A New Method for Scalable and Reliable Multicast System for Mobile Networks

2.1

33

Conventional Approach

(1) Sender-Based approach (SB) A sender performs retransmission with Nack (error report) or/and Ack (error-free report) feedback scheme. In SB approach, the sender repeats retransmission in multicast until all members get multicasting data correctly. This approach includes typical point-to-point reliable protocols (TCP, HDLC etc.) and early multicasting protocol. This approach causes implosion problem with the number of member increased. And the bandwidth for feedback is required over the whole network, i.e., resource consuming problem issues. (2) Receiver-Based Approach (RB) This approach employs local group concept. In this approach, recovery is carried out by a receiver which represents its LG instead of sender. LC (Local Controller) is predefined. It can avoid implosion problem thanks to local management of feedback and recovery. Recent most efforts, SRM, PGM, LGMP, RMTP and MESH that I cited in section1, belong to this approach. As already explained, the problem for mobile network is that the low capacity and instable quality of the wireless link and the low performance of LC make local recovery inefficient. Other is that the movement of LC could cause terminal mobility difficult. 2.2

New Approach

(3) Network-Based Approach (NB) The new approach also adopts local group concept. In this approach, it is a network node that takes care of recovery instead of a sender or receivers. The node forms LG dynamically to execute local recovery. Therefore, it is not difficult for the network to track the movement of MT with usage of terminal mobility function of mobile network. As a result, it is expected to solve the problems that conventional approach issues as explained previously, and to satisfy the four requirements that described in section1. The next section explains the new method including how to decide the network node as LC in the next section.

3

New Method

3.1

Network Architecture

We assume mobile network with IP-based which is constructed by router as network node. The network consists of several subnetworks in Figure1(a). Each subnetwork is connected by Border Router (BR) which keeps temporarily relaying data frames for recovery, or manages local group address and so on for management of subnetwork. Figure1(b) illustrates an example of subnetwork near MT. In this Figure, router3 and router5, which are LCs for local group1 and local group2, respectively, request and download recovery data from BR for its own group.

34

M. Hayashi and C. Bonnet

Multicast Data

Sender

: Multicast tree : Feedback

Subnetwork

: Radio cell : MT

BR : BorderRouter BS : Base Station Router2 ` Recovery data frame

Subnetwork ?

Subnetwork

BR

Router1

BR

Mobile Network

Subnetwork

Recovery data frame

Router3

BR

BR

router4

`

Router 5

Subnetwork BS

BS

Local Group1

BS

Local Group2

Multicast Receiver Group

(a) System structure

router

: LC

(b) Subnetwork

Fig.1. System architecture

3.2 Algorithm for Decision of LC (Local Controller) The policy of the algorithm is that it could reduce traffic generated in recovery and save the network resource as much as possible. Using Figure2, the algorithm is demonstrated as follows. After a given data frame is multicasted to all MTs of a multicast group, feedbacks from MTs come up to routers. The router that has received the feedbacks makes judgement if there is a coincidence with feedback for error from plural lower routers (Figure3). If not, the router orders the lower router Reception of negative feedbacks from lower routers

One data frame BR Request of recovery frame LC Router 1

Router 0 Indication Router 2

??

Router 3

Is there coincidence of Error from plural lower routers ?

Router 4 ?

Yes Tell error state to higher router

Local group by Router1

Data

Initial data frame Recovery frame

feedback

Fig.2. DSD algorithm

No error Error

No Order lower router to become LC

Fig.3. DSD : LC selection

A New Method for Scalable and Reliable Multicast System for Mobile Networks

35

with negative feedback to become a LC. If any, it sends negative feedback up to the higher router. In figure2, at router1, for instance, there is a coincidence with feedbacks with error from router3 and router4, and the router1 reports the coincidence to the higher router0. At the router0, the coincidence with the feedbacks breaks, and the router0 indicates the router1to become LC. Accordingly router1 as LC organizes its LG (Local Group) to carry out recovery in multicast; the router1 gets the recovery data and local multicast address from BR and defines the LG by a set of erroneous MTs under the routers of which the highest is router1, and then executes retransmission. Thus, LC router is selected considering the geographical distribution of erroneous MT (we named the algorithm “DSD; Dynamic Selection based on the Distribution”) and dynamically forms LG for recovery. In this way, we can obtain the characteristics that the more densely error happens, the higher router would become LC for covering erroneous MTs properly. As a result, efficient recovery and usage of resource can be expected. 3.3 Terminal Mobility The new method, NB, could make realization of the mobility much easier. The process of mobility is able to make use of the existing mobile IP function of network because it is the network node that takes care of recovery in NB. Here we just outline only the point of study for mobility since the objective of this paper is to prove that NB-DSD algorithm is effective for mobile networks. The action sequence of mobility was considered on the timing of MT movement to the algorithm execution. In case of the movement of MT before NB-DSD algorithm execution, LC router in the destination of MT recovers it, while in the reverse case, the original LC router continues to recover it.

4

Evaluation

In this section, the evaluation of the new approach with NB-DSD method is described through comparison with conventional approaches (SB and RB). 4.1 Outline of Evaluation The evaluation consists in verification of scalability, efficiency of reliability and effectiveness of dynamism of the new method. The mean transmission time per one data frame and the mean number of retransmissions were observed in the simulation. It is enough that the evaluation is done only on subnetwork with connection to MT in Figure1 since the highest LC router is BR.

36

M. Hayashi and C. Bonnet Sender Multicast Data BR router router

router router

router

router

router router router router router router router router

Fixed local group for RB

Fig.4. Simulation model (for the case of MTs =16)

Table 1. Notation NM Pr Cn Cr Cs

The number of MT Data frame error probability at wireless link Capacity of the link inside network Capacity of the receiver–network wireless link Capacity of the sender–network link

4.2 Simulation Model and Assumptions Figure4 is an example of simulation model for a subnetwork which consists of one sender, sixteen MTs and fifteen routers. There are some assumptions; - Each router has two interfaces to lower router and one interface to upper router and the lowest router accommodates two MTs. - Regarding the method RB, one local group is defined by every four MTs including LC for recovery. - Error with data arises only on wireless link in accordance with probability of uniform random distribution. - Multicast transmission is simulated for total file = 500[kB], data frame length = 2000[bit]. Table1 shows the parameter notation. 4.3 Results (1) Scalability For evaluation of scalability, the increase ratio of the mean transmission time per one frame was measured with a variation of the number of MTs that represents network scale as appeared in Figure5. The increase ratio was calculated using the standard

A New Method for Scalable and Reliable Multicast System for Mobile Networks

37

case of the transmission time for Nm = 4. In this Figure, only SB has much higher ratio with the number of MTs. It is because, in SB, the sender has to take care of retransmission for all of increased erroneous members, while, in RB and NB-DSD, each LC does it only for local erroneous members. In Figure6 shows the number of retransmissions for the same conditions as that of Figure5. From this result, only on SB, the more the number of MTs increases, the more the sender repeats retransmission over the whole subnetwork, that causes wasting of network resource. These results indicate that the local group scheme has much better scalability.

10.0 9.0 8.0 7.0 6.0 5.0 4.0 3.0 2.0 1.0 0.0

SB RB NB-DSD

4

8

16

32

64

The number of MT

Fig.5. Increase ratio vs. Network scale

Pr = 5.0 %, Cs =19.2kbps, Cn = 28.8kbps, Cr = 9.6kbps Errors happen at all MTs

The mean number of retransmission

Increase rate of transmission time

Pr = 5.0 %, Cs =19.2kbps, Cn = 28.8kbps, Cr = 9.6kbps Errors happen at all MTs

1,4 SB

1,2

RB

1

NB-DSD

0,8 0,6 0,4 0,2 0 4

8

16

32

64

The number of M T

Fig.6. The number of retransmission vs. Network scale

(2) Efficiency of reliability Figure7 illustrates the increase ratio of the mean transmission time with a variation of frame error probability of wireless link. This result also shows that SB has much worse performance in recovery than the local schemes. The fact suggests that SB cannot deal with recovery in efficient manner for deteriorated wireless link quality. And the result shows that NB-DSD has considerably (about by a half) lower ratio than SB. Compared with RB and NB-DSD using the result of the number of retransmissions in Figure8 for the same conditions as that of Figure7, in which NB-DSD is lower than RB by about a half, we see that the quality of wireless uplink (MT • mobile network) impacts directly on recovery efficiency considering that the main difference between RB and NB-DSD is whether the wireless uplink is used for retransmission. Moreover the uplink capacity also influences the efficiency in negative on RB as appears in Figure9. The influence is bigger particularly for the condition of low capacity of wireless uplink. Therefore, the conditions of wireless link exert worse influence on recovery efficiency of RB than that of NB-DSD.

38

M. Hayashi and C. Bonnet

Nm = 64, Cs = 19.2kbps, Cn = 28.8 kbps, Cr = 9.6kbps, Errors happen at all MTs

Nm = 64, Cs = 19.2kbps, Cn = 28.8 kbps, Cr = 9.6kbps Errors happen at all MTs

1

6.0

SB

5.0

RB NB- DSD

No. of retransmission

Increase ratio of transmission time

7.0

4.0 3.0 2.0 1.0

RB

0.8

NB-DSD

0.6 0.4 0.2 0

0.0 0.0

1.0

2.0

5.0

10.0

20.0

0

Frame error probability on wireless link [%]

Fig.7. Increase ratio vs. Wireless link quality

1

2

5

10

20

Frame error probability on wireless link [%]

Fig.8. The number of Retransmission vs. Wireless link quality

Nm = 64, Pr = 10 % Cs = 19.2kbps, Cn = 56.6 kbps, Cr = 9.6kbps,

Nm = 64, Pr = 10 % Cs =19.2kbps, Cn = 56.6kbps, Cr = 9.6kbps

5.0

1 .6

4.0

RB

3.0

NB-DSD

2.0 1.0 0.0 2.4 4.8 9.6 19.2 28.8 56.6 Capacity of wireless link [kbps]

Fig.9. Mean time vs. Capacity of wireless link

Mean trans.time per frame [s]

Mean transmission time per frame [s]

Errors happen at all MTs

RB

1 .4 1 .2

NB-DSD 1 0 .8 D e ns e m o d e S p a rs e d m o d e

0 .6 0 .4 0

25

50

75

100

Erroneous MT ratio [%]

Fig.10. Mean transmission time vs. Distribution of erroneous MTs

(3) Dynamism of NB-DSD algorithm The effectiveness of the dynamism on NB-DSD is made clear through comparison with RB as fixed strategy. Figure10 shows the mean transmission time per one data frame with a variation of ratio of erroneous MT. The two kinds of the geographical distribution of erroneous MT were selected as parameter, i.e., sparse mode and dense mode. Sparse mode is the state that erroneous MTs lie scattered uniformly over the network. On the other hand, dense mode is that erroneous MTs lie together. In this result, it is evident that the transmission time is different depending on the distribution for RB method, while it is almost the same for NB-DSD method. The fact implies the

A New Method for Scalable and Reliable Multicast System for Mobile Networks

39

new algorithm can dynamically choose LC routers considering the state of erroneous MT distribution for covering erroneous MTs properly (i.e. the more densely error happens, the higher router would become LC for this area) so as to form several proper groups for local recovery towards the reduction of recovery traffic and network resource consumption.

5

Conclusion and Future Work

In this paper, we examined the problems of existing protocols for reliable multicast when applying them to mobile network, and proposed the new method. The new method (NB-DSD) was compared with two conventional generic approaches (SB and RB) with regard to scalability and efficiency of reliability and dynamism. Concerning terminal mobility, we can expect that the new method reduces greatly the difficulty of its realization. Our conclusion by the evaluation is the following; (1) The new method (NB-DSD) which employs dynamic local group concept is the most suitable for mobile network with regard to large scalability and efficiency for reliability and can be expected to realize a very large scale and high reliable multicast system. (2) The dynamism of new method (NB-DSD) enables to absorb the volatile geographical distribution to reduce traffic generated in recovery and economize the network resource. In the future, we will take additional metrics (e.g. link congestion etc.) into account for the decision LC algorithm in order to obtain more fitting algorithm for real network.

References 1. J.F.Huber, D.Weiler and H.Brand, “UMTS, the Mobile Multimedia Vision for IMT-2000: A focus on Standardization,” IEEE Communication Magazine,Vol.38 No.9,2000 2. T.A.Maufer, “DEPLOYING IP MULTICAST IN THE ENTERPRISE,” Prentice Hall PTR,1998. 3. C.K.Miller, “Multicast Networking and Applications,” Addison Wesley,1998. 4. S.Floyd, V.Jacobson, S.McCanne,C.Liu and L.Zhang, “A Reliable Multicast Framework for Light-weight Sessions and Application Level Framing,” in Proc. ACM SIGCOMM’95, Boston, MA, Aug. 1995, pp. 342-356. 5. T.Speakman, D.Farinarri, S.Lin, A.Tweedly, “Pretty Good Multicast (PGM) Transport Protocol Specification,” Internet Draft, draft-spealman-pgm-spec00.text, January 8, 1998. 6. M.Hofmann, “A Generic Concept for Large-Scale Multicast,” in Proc. IZS’96, Feb. 1996, No.1044. 7. J.C.Lin and S.Paul, “RMTP: A Reliable Multicast Transport Protocol,” in Proc. IEEE INFOCOM’96, March 1996, pp. 1414-1424.

40

M. Hayashi and C. Bonnet

8. S.Paul, K.K.Sabnani, J.C.Lin and S.Bhattacharyya, “Reliable Multicast Transport Protocol (RMTP),” IEEE Journal on Selected Areas in Com., Vol.15, No.3, April 1997, pp. 407-421. 9. M.T.Lucas, B.J.Dempsey and A.C.Weaver, “MESH: Distributed Error Recovery for Multimedia Streams in Wide-Area Multicast Networks,” IEEE ICC’97, June 1997.

An Adaptive Mobility Management Scheme to Support Internet Host Mobility Miae Woo Department of Information and Communications Engineering Sejong University 98 Kunja-Dong, Kwangjin-Ku, Seoul, Korea [email protected]

Abstract. To cope with the Internet host mobility in a cellular network environment, we proposed an adaptive mobility management scheme that can compensate drawbacks of Mobile IP. Our proposed scheme determines foreign agent care-of addresses adaptively according to user mobility. Consequently, it is different from other proposals for micro mobility, which statically assign the gateway in the domain as a foreign agent. Using such a scheme, it is possible to effectively meet the user’s demands for different service qualities in the various environments considered in the cellular network and to reduce signaling overhead due to frequent handovers occurred in Mobile IP. The performance of the proposed scheme is examined by simulation. The results of simulation show that the proposed scheme can provide relatively stable points of attachment to the mobile node.

1

Introduction

This paper presents a new approach to Internet host mobility. Mobile IP[1] was designed to provide wide area mobility support. Adopting Mobile IP in the cellular network where a mobile host visits different subnets from time to time results in quite numbers of signaling messages to the home network and significant signaling delay. To overcome such drawbacks, several proposals[2-5] that separate local area mobility, say micro mobility, from wide area mobility have been made. These proposals choose a gateway that connects its domain to the global Internet as a representing foreign agent (FA) of its domain. During stay within a domain, the mobile node registers to its home agent with care-of address of the gateway only once, resulting in minimizing signaling overhead. On the other hand, QoS provision for the mobile node has to be sacrificed unless there is an additional QoS provision method in the visited domain. In the cellular network, users expect to receive different services according to their mobility. For example, third-generation systems are expected to offer at least 144kb/s for very high-mobility users in vehicles, 384 kb/s for pedestrians with wide-area coverage, and 2 Mb/s for low-mobility users with local coverage [6]. In order to provide various service qualities that are appropriate to the state of user mobility, micro mobility scheme adopted in the network should use an adaptive scheme. In such a perspective, the micro mobility schemes proposed in the other literatures assign a gateway as a foreign agent statically, resulting in lack of adaptability. To P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 41–50, 2001 © Springer-Verlag Berlin Heidelberg 2001

42

M. Woo

effectively meet the user’s demands for different service qualities in such various environments and to reduce signaling overhead due to handovers, we propose an adaptive foreign agent determination scheme that chooses the foreign agent care-of addresses adaptively according to user mobility. We also propose a network architecture that can support such an adaptive foreign agent determination scheme. In the proposed architecture, it is assumed that the cellular network is all-IP network, since the wireless industry is evolving its core networks toward IP technology[7]. The base stations and the other nodes in the access network are all IP nodes, and any of them can be chosen as a foreign agent of a specific mobile node. The mobile nodes that are connected with the same base station may have different foreign agents. Choice for a foreign agent is based on the user mobility. By applying adaptive foreign agent determination, it is possible to provide the required QoS up to the base station that is not considered in the other proposals in micro mobility. In the extreme case, when foreign agent is fixed to be a base station, then our scheme becomes Mobile IP[1]. If foreign agent is fixed to be a gateway, then it corresponds to the other micro mobility proposals. The proposed adaptive scheme has following advantages compared to the others. • It can distribute loads throughout the IP nodes in the access network by locating foreign agents according to the mobility of mobile nodes. In other proposals for micro mobility, all loads for providing mobility service are concentrated on the gateway. • It can provide a relatively stable point of attachment to the mobile node. Although overall signaling overhead due to handovers is larger than other micro mobility schemes, the effect of the overhead on the network performance can be regulated. • If the base station is not chosen for the foreign agent, it introduces one more tunnel that is in between the foreign agent and the base station. So it uses intrinsic IP routing between the foreign agent and the serving base station. Consequently, it eliminates need for maintaining tables or caches in the nodes that are located in between the foreign agent and the serving base station en route. • It can provide appropriate levels of QoS to the mobile nodes using networkintrinsic QoS provision mechanisms. The rest of this paper is organized as follows: Section 2 presents an overall network architecture for the proposed scheme. Section 3 describes the proposed adaptive foreign agent determination scheme. Performance evaluation of the proposed scheme is presented in Section 4. Section 5 describes how the proposed scheme can provide an appropriate level of QoS. Section 6 concludes this paper.

2

An Overview of the Proposed Architecture

In this section, we present a network architecture for the adaptive mobility management. The proposed micro mobility architecture is depicted in Fig. 1. It is assumed that the proposed architecture supports three levels of network node hierarchy. The base stations belong to the lowest level. The intermediate nodes that are one hop away from the base stations towards the gateway are the elements of the second level. Finally, the gateway forms the third level. The network node hierarchy can be extended freely if required.

An Adaptive Mobility Management Scheme to Support Internet Host Mobility

global Internet

43

Home Network

GW

HA

GW

R1

Foreign Network

R2

BS1

R4

BS7

BS4 BS6

BS3 BS5

BS2

BS9 BS8

MN

Fig. 1. Network architecture

A foreign network is consisted of a set of subnets, which correspond to the cells in the cellular network. In each subnet, there is a base station that provides an access point to the mobile nodes. The base station to that a mobile node is currently attached is called as a serving base station in the paper. In Fig. 1, BS2 is the serving base station to the mobile node MN. All base stations, intermediate nodes, and the gateway are assumed to be IP nodes and can be act as foreign agents if required. In this paper, FA level is used to describe how many hops the candidate foreign agent away from the mobile node. In other words, FA level n means that the candidate foreign agent is n hops away from the mobile node towards the gateway. For each mobile node, its mobility is calculated at the handover time and an appropriate FA level is determined. The mobile node then uses the IP address of a node with the determined FA level as a foreign agent care-of address. The mobile node with FA level 1 uses the address of the serving base station as its foreign agent care-of address. The foreign agent care-of address of the mobile node with FA level 2 is the address of the intermediate node. The foreign agent care-of address of the mobile node with other FA level can be determined similarly. Using the IP intrinsic reachability information, each base station can build and maintain a list of foreign agent care-of addresses. Each item in the list corresponds to the appropriate FA level. For example, the list of foreign agent care-of addresses maintained by the BS2 in the Fig. 1 is {(FA level 1 = IP address of BS2), (FA level 2 = IP address of R1), (FA level 3 = IP address of GW)}. In the proposed architecture, we use the Mobile IP regional registration[2] with some modification for the micro mobility. Consequently, two types of registration, say home registration and regional registration, are considered. Home registration is a registration with the home agent in the home network of the mobile node. Home registration is executed when the mobile node needs to change the foreign agent. Regional registration is a registration with the foreign agent if the mobile node can

44

M. Woo

continuously use the foreign agent of the previous subnet after changing the subnet. When a mobile node first arrives at a visited domain, it always performs a home registration. When a mobile node moves inside the domain, it needs to do either home registration or regional registration depending on the selected foreign agent in the new subnet. In the following section, we propose a procedure to determine a foreign agent careof address to be used by a moved mobile node and to determine the need for home registration or regional registration.

3

Adaptive Determination of a Foreign Agent

When a mobile node moves into an adjacent subnet, it should associate with the base station in the newly visiting subnet. Also, it is required to determine a foreign agent through which the mobile node should maintain connection with its home agent and the corresponding host. An appropriate foreign agent can be chosen based on how frequently the mobile node changes subnets. In other words, user mobility can be modeled as handover frequency in the cellular network. In this paper, mobility frequency is used as the referring terminology. If mobility frequency is high, the mobile node moves fast. If mobility frequency is low, the mobile node is said to be in a stationary state. In this section, we describe how to determine a foreign agent based on the mobility frequency of the mobile node. 3.1

Mobility State and Mobility Frequency

Mobility frequency is the quantitative term for how frequently a mobile node moves among subnets. Depending on mobility frequency, three mobility states, say stationary, slow-moving, and fast-moving states, are considered in this paper. Whenever a mobile node moves into an adjacent subnet, its mobility frequency and the corresponding mobility state are determined. According to the mobility state, an appropriate IP node is chosen for a foreign agent. In general, mobility frequency f t (i ) of a mobile node when it requires nth n

handover in the foreign network at time tn can be calculated as follows: i f t (i ) = t n − t ( n −i ) n

In the equation, i represents the window size of the moving average in calculating mobility frequency. When i is equal to 1, mobility frequency f t (1) is mobility rate n

from the last handover. Similarly, f t (i ) is the average mobility frequency in the latest n

i handovers.

An Adaptive Mobility Management Scheme to Support Internet Host Mobility

45

f tn > ρ 2

f tn > ρ 2

ρ1 < f tn ≤ ρ 2 stationary

slow-moving

fast-moving

ρ1 < f t ≤ ρ 2 f tn ≤ ρ 1

f tn ≤ ρ 1

n

ρ1 < f t n ≤ ρ 2

f tn > ρ 2 f tn ≤ ρ 1

Fig. 2. Mobility state transition diagram

Stability of a point of attachment is a relative term in a mobile environment. If a mobile node maintains association with a foreign agent for a reasonable amount of time, then we could say that the mobile node is attached to a stable point. By analyzing the user’s mobility pattern, one can determine the reasonable value for attachment time that is regarded as stable. Based on the determined value, threshold values among stationary state, slow-moving state, and fast-moving state can be determined. Let ρ1 and ρ 2 be the determined threshold values for deciding mobility state of a mobile node as stationary state, slow-moving state, or fast-moving state. A mobility state is changed depending on mobility frequency as shown in Fig. 2. In the figure, f t represents mobility frequency calculated. Selecting proper window size to n

calculate f t is given in Section 3.2. n

Each mobility state has the corresponding FA level. Mobility states of stationary, slow-moving, and fast-moving correspond to the FA level 1, 2, and 3 respectively. So, based on the determined mobility state, one can decide what the FA level is to be used and which node is used as a foreign agent for the mobile node. In the next subsection, we develop a procedure for choosing an appropriate foreign agent care-of address. 3.2

Procedure for Choosing a Foreign Agent

To provide a stable point of attachment, it is desirable not to change a foreign agent unless it is necessary. For that purpose, we develop two provisions in determining a foreign agent. The first provision is to represent the trend of mobility pattern of a mobile node effectively. The second one is to maintain the same foreign agent if possible. • Provision 1: The first provision is use of different window size values in calculating mobility frequency. Let the previous FA level denote the FA level of a mobile node in the previous subnet. If the previous FA level of the mobile node was 1, then the mobile node needs to register to the home agent with a new foreign agent care-of address. So in this case, it is better to represent the mobility of the mobile node as it is in the calculation of mobility frequency and to determine the FA level accordingly. Subsequently, it is desired to use f t (1) in this case. When n

the previous FA level was not 1, moving average of window size 2 is used to

46

M. Woo

calculate mobility frequency. By using moving average, it is possible to average out mobility frequency and to represent the trend of mobility pattern of a mobile node. • Provision 2: For the second provision, the foreign agent that is used in the previous subnet is checked whether it can be used continuously as a foreign agent in the new subnet. Let the newly determined FA level in the new subnet be 3 and the FA level in the previous subnet be 2. In such a case, if the foreign agent with level 3 in the new subnet can be reachable through the previous foreign agent with level 2, there is no need to change the foreign agent since the mobile node can continuously communicate through the foreign agent in the previous subnet. Such provision eliminates unnecessary signaling to the home network. In this case, the current serving base station of the mobile node is notified to the foreign agent using regional registration. By incorporating the provision 1 and 2, we develop a procedure for determination of a foreign agent care-of address for a mobile node at its nth handover time. The proposed procedure is listed in below. PROCEDURE FADetermination // Provision 1 // Calculate mobility frequency if (prevFAlevel == 1) { // use moving average of window size 1 f t = 1/ (t n − t n −1 ) ; } else { // use moving average of window size 2 f t = 2/ (t n − t n − 2 ) ; } n

n

// Determine the mobility state and the new FA level // depending on mobility frequency if ( f t ≤ ρ 1 ) // stationary state newFAlevel = 1; elseif ( f t ≤ ρ 2 ) // slow-moving state newFAlevel = 2; else // fast-moving state newFAlevel = 3; n

n

Choose a newFAaddress with newFAlevel from the FA list in the new serving base station; // Provision 2 if ((newFAlevel >2) and (prevFAaddress is in the FA list in the new base station)) { // use the previous FA in the newly visited subnet newFAlevel = prevFAlevel; newFAaddress = prevFAaddress; } if (newFAaddress is different from prevFAaddress) home registration is required;

An Adaptive Mobility Management Scheme to Support Internet Host Mobility

47

else regional registration is required; In the next section, we verify the performance of the proposed procedure through simulation study.

4

Performance Evaluation

We study how stable point of attachment the proposed procedure in Section 3.2 can provide by a simulation study. For the simulation, it is assumed that a mobile node stays in a subnet with an exponential distribution. The mean stay time of the mobile node in a subnet varies with its mobility state type. Let the mean stay time of a mobile node with stationary state be τ 1 . We use τ 1 as a reference value for the mean stay time of a mobile node with other state. For the simulation, the mean stay times in the slow-moving and fast moving states are assumed to be (1/8) τ 1 and (1/40) τ 1 respectively. It is assumed that a mobile node maintains one mobility state during its stay in a subnet. When the mobile node moves to an adjacent subnet, new mobility state is determined based on the previous mobility state. The mobility state transition probability considered is as follows:  0.7 0.2 0.1  P = 0.25 0.5 0.25  0.1 0.2 0.7  In the simulation, we investigate the performance of five methods in terms of how many home registrations are required due to the change of a foreign agent, and compare their results to that of Mobile IP. Five methods used in the simulation are listed in below. • Method 1: Mobility frequency is calculated with window size of 1. A FA level and the foreign agent care-of address are chosen according to the calculated mobility frequency. • Method 2: Mobility frequency is calculated with window size of 2. A FA level and the foreign agent care-of address are chosen according to the calculated mobility frequency. • Method 3: Mobility frequency is calculated with window size of 3. A FA level and the foreign agent care-of address are chosen according to the calculated mobility frequency. • Method 4: Mobility frequency is calculated with the provision 1. A FA level and the foreign agent care-of address are chosen according to the calculated mobility frequency. • Method 5: Mobility frequency is calculated with the provision 1. A FA level and the foreign agent care-of address are chosen using the provision 2. This is the proposed method in Section 3.2. Method 1, 2 and 3 are used to see the effect of the window size values in calculating mobility frequency. Method 4 and 5 are used to see how our proposal produces better results.

48

M. Woo

In the simulation, we change the threshold values ρ1 and ρ 2 , and see their effect on the performance of each method. From the simulation result, it is observed the performance of each method depends on the threshold value ρ1 . However, the threshold value ρ 2 does not have much effect on the performance. Fig. 3 shows the effect of ρ1 on the performance of the five methods. In the figure, the value of ρ1 is represented as a ratio of the mean stay time of a mobile node in a stationary state τ 1 . In the figure, the number of home registration required by Mobile IP is used as a reference value and the number of home registration required by each method is compared to it. As shown in the figure, Method 5, which is the proposed scheme in Section 3.2, requires the least number of home registrations. Also, the effect of chosen value for the threshold ρ1 is well illustrated. When the ρ1 value is less than 1/ τ 1 ( ρ1 = 0.4/ τ 1 or ρ1 = 0.7/ τ 1

in the figure), The number of home registration

Ratio of the no. of home registration

required by Method 5 is about 27% of Mobile IP. As the value for ρ1 increases, the number of home registration required by Method 5 also increases. 0,4 0,7 1 2,2 3,4

1

0,8

0,6

0,4

0,2

0

MIP

Method1

Method2

Method3

Method4

Method5

Fig. 3. The ratio of the number of home registration compared to Mobile IP in various ρ1 values (in 1/ τ 1 unit)

In the figure, it can be observed that the performance gets better as the window size increases when ρ1 ≤ 1/ τ 1 . However, when we look at the results more closely, it is observed that there are lagging phenomena in determining the FA level as the window size increases especially when the mobility state changes from stationary to other states. For such phenomena, provision 1 in Section 3.2 seems to be effective. We analyze how many times home registration is required in τ 1 time using the simulation result. The result is depiected in Fig. 4. When using Method 5, a mobile node requires to do home registration in every 1.5 τ 1 on average when ρ1 = 0.4/ τ 1 . Such frequency of home registration is definitely larger than that of other micromobility schemes. However, as shown in Fig. 3 and Fig. 4, the number of home

An Adaptive Mobility Management Scheme to Support Internet Host Mobility

49

registrations in a unit time can be regulated by choosing the appropriate value for the threshold value ρ1 . 3

0,4 0,7 1 2,2 3,4

Frequency of home registration

2,5 2 1,5 1 0,5 0

MIP

Method1

Method2

Method3

Method4

Method5

Fig. 4. Frequency of home registration in τ 1 in various ρ 1 values (in 1/ τ 1 unit)

5

QoS Supports

In this section, we briefly discuss how our proposed scheme can provide the desired QoS to the mobile nodes. If any reservation protocol that can work through tunnels is employed, then end-to-end QoS provision can be achieved. For example, RSVP operation over IP tunnels[8] can work in such a situation. If that is not the case, then we can consider two options for the macro mobility. One is Mobile IP[1], and the other one is Mobile IP with route optimization[9]. When Mobile IP is used, reservation from the corresponding node to the home network is only provided. When Mobile IP with route optimization is used, reservation from the corresponding node to the foreign agent can be established. As a result, the range of QoS supports is depend on the user mobility. For the stationary mobile node, QoS support from the corresponding node to the serving base station is possible. Subsequently, a certain level of guaranteed QoS can be provided to the mobile node. For the fast-moving mobile node, QoS support from the corresponding node to the gateway is possible. In this case, users are expected to get some important messages probably in a less bandwidth-consuming format, so degradation in QoS may be tolerable. By using such an adaptive scheme, the proposed method provides stable point of attachment as well as provides adequate QoS to the mobile user.

6

Conclusion

In this paper, we proposed an adaptive mobility management scheme to cope with the Internet host mobility in a cellular network environment. The first goal of the proposed scheme is to effectively meet the user’s demands for different service

50

M. Woo

qualities in the various environments considered in the wireless network. The second goal is to reduce signaling overhead due to frequent handovers. To achieve such goals, the proposed scheme determines the foreign agent care-of addresses adaptively according to user mobility. By adopting such an adaptive scheme, it can distribute loads for providing mobility service throughout the IP nodes in the access network while other proposals for micro mobility put all loads on the gateway. The stability of the provided point of attachment is studied by simulation. The simulation results show that our scheme can provide a relatively stable point of attachment to the mobile node. Although overall signaling overhead due to handovers is larger than that of other micro mobility schemes, it can be regulated by adjusting the threshold values for determining mobility states so that network performs well enough.

References 1. C. Perkins, ed., “IP Mobility Support,” IETF RFC 2002, Oct. 1996. 2. E. Gustafsson, A. Jonsson, and C.E. Perkins, “Mobile IP Regional Registration,” Internet draft (work in progress) draft-ietf-mobileip-reg-tunnel-02.txt, Mar. 2000. 3. Campbell, et. al., “Cellular IP,” Internet draft (Expired), , Jan. 2000. 4. R. Ramjee, et. al., “IP Micro-Mobility Support using HAWAII,” Internet draft, , Jul. 2000. 5. S. Das, et. al., “TeleMIP: Telecommunications-Enhanced Mobile IP Architecture for Fast Intradomain Mobility,” IEEE Personal Communications, Aug. 2000, pp. 50-58. 6. T. Ojanpera and R. Prasad, “An Overview of Third-Generation Wireless Personal Communications: A European Perspective,” IEEE Personal Communications, Dec. 1998, pp. 59-65. 7. G. Patel and S. Dennett, “The 3GPP and 3GPP2 Movements Toward an All-IP Mobile Network,” IEEE Personal Communications, Aug. 2000, pp. 62-64. 8. A. Terzis, et. al., “RSVP Operation Over IP Tunnels,” RFC2746, Jan. 2000. 9. Charles Perkins and David B. Johnson, “Route Optimization in Mobile IP,” Internet draft, , Nov. 2000.

Modeling and Analysis of TCP Enhancement over Heterogeneous Links Mingyan Liu and Navid Ehsan University of Michigan, Ann Arbor, MI 48109-2122, USA, {mingyan, nehsan}@eecs.umich.edu,

Abstract. In this paper we focus on one type of TCP enhancement commonly used to improve performance for connections over heterogeneous physical layer, namely, TCP connection splitting or split TCP, where the end-to-end TCP connection is split in segments so that each segment runs over a homogeneous environment and is optimized separately. This paper presents a simple model capturing some of the features of this scheme where split segments are essentially “coupled” TCP connections. We use simulation to validate our models and use our model to analyze situations where split TCP is preferred to the end-to-end scheme, and where the performance gain of splitting vanishes by investigating factors including initial window size, file size, number of on-going connections and loss.

1

Introduction

With the advances in wireless technology, wireless communication is becoming more and more common. It is well known that the original form of TCP does not do well over wireless links where packet losses due to link failure is more prevalent than losses due to congestion, since TCP takes any loss as a sign of congestion. TCP also does not do well over large bandwidth-delay-product links, e.g., a satellite link, since it takes a long time for the congestion window to fully utilize the channel, which is particularly inefficient for short connections. Extensive research has been done over the past few years to improve the TCP performance over heterogeneous connections, see for example [1]. One type of enhancement completely segregates the wireless part of the connection from the wired part. This scheme is often called TCP splitting or spoofing [2] in satellite communication and I-TCP [3] in terrestrial wireless communication. In general, by this segregation, the end-to-end TCP semantics are inevitably broken or altered, e.g., MTCP [4]. Another type of enhancement maintains the TCP end-to-end semantics, but tries to reduce the impact of the wireless link. This involves differentiation between the wired part and the wireless part, although the impact of the wireless link cannot be completely singled out because of the end-to-end semantic [5,6,7,8,9]. There are also schemes that focus on the link layer characteristics and often involves link layer retransmission [10]. Among these solutions, split TCP was proposed, in view of TCP’s inability to handle heterogeneous environment, with the idea that if a communication P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 51–60, 2001. c Springer-Verlag Berlin Heidelberg 2001 

52

M. Liu and N. Ehsan

path consists of physical medium that are of very different characteristics, then the end-to-end performance is optimized by isolating one type of physical link from another and optimizing each separately. This violates the TCP end-to-end semantics, and will not work if the IP packet payload is encrypted [11], which has been a major criticism for this type of schemes. Nevertheless, split TCP is very commonly used in satellite based data services because there seems to be no other apparent solution to deal with the large bandwidth-delay-product of the satellite link without having to modify the end systems. On the other hand it has also been observed that when the satellite link becomes congested, the performance gain from TCP splitting reduces, and could even disappear [2]. This motivated us to do a quantitative study on split TCP as a solution to heterogeneous environment. This paper presents mathematical models to analyze the applicability of this scheme, and the amount of improvement under different situations by varying a number of parameters, including the initial window size, file size, and link propagation delay. This paper is organized as follows. In Section 2 we present the network model and give a brief introduction to the technique of connection splitting. In Section 3 we derive the model and use it to analyze the latency in file transfer. The accuracy of our model is discussed. Section 4 discusses our results and concludes the paper.

2 2.1

Split Connection and the Network Model Network Model

Our analysis is based on a two link model with one end host on each side of the tandem of two links, and a proxy at the junction of the two links, as shown in Figure 1, where the two circles in the middle represent possibly coupled connection when split TCP is used. We assume one is a fixed terrestrial link, and the Client

Proxy

Server

Fig. 1. Network Model

other is either a satellite or a terrestrial wireless link, which is represented by different propagation delay and error rate of the link. Without loss of generality, we assume that the client is located at the end of the wireless/satellite link and that the server is located at the end of the terrestrial link. File transfer is our main application of interest, and are considered to be from the server to the client. When the end-to-end connection is used, the proxy functions as a normal router that forwards packets from the source to the destination. When split connection is used, the proxy typically acknowledges the packets received from

Modeling and Analysis of TCP Enhancement over Heterogeneous Links

53

the server on behalf of the client, and opens up a second connection between itself and the client, and sends packets received from the server to the client as if it were the server, thus the term “split connection”. Same procedure is used for the other direction of the connection. The proxy is transparent to the end points. In general, the initial connection establishment (three-way handshake) and the final connection closing are done in exactly the same way as in an end-to-end connection. Thus the connection is only split in two during the data transfer stage. The focus of this paper is to examine the response time or latency in file transfers, using end-to-end or split TCP. In our analysis we do not include the time for connection establishment (including file requests), since this duration is the same in both cases. Therefore our latency in file transfer is defined as the duration between when the server sends the first data packet of a file and when the client receives the last data packet of a file. 2.2

Assumptions and Parameters

We mainly consider the lossless case in this paper. When there is no loss, the congestion window grows exponentially during slow start, linearly during congestion avoidance and then stays at maximum window size. We assume that a file contains exactly M segments of maximum segment size (M SS). This is an approximation to an arbitrary file size whose last segment may be a fraction of M SS. However, in calculating latency, this does not affect our method of analysis, and also does not affect the comparison between using end-to-end TCP and using split TCP. The ssthresh, Wsst , and the maximum window size Wmax are assumed to be in number of segments rather than number of bytes to simplify our analysis. Again, these may not be the exact values, but they do not affect our study. The server, the proxy and the client each has a transmission rate of C1 , Cp , and C2 , respectively. Assuming packet length of D = M SS + 40 (TCP and IP headers), the time it takes for the server to transmit a packet is µ1 = CD1 , and µp = CDp ,

µ2 = CD2 for the proxy and the client, respectively. When splitting is used, we assume a per-packet processing delay of tp at the proxy. All other processing delays are ignored. Through out our analysis, we assume the transmission time of an ACK to be negligible. In addition, we assume that the transmission is only constrained by the congestion window and not the advertised receive window size. The one-way propagation delay on the server-proxy link and the proxy-client link are denoted by I1 and I2 , respectively. We assume that the delay on each link is symmetric, although our analysis can be easily generalized to the asymmetric case. Most work in TCP analysis assumes an infinite source, e.g., [12,13,14]. However, when connection splitting is used, the window of the second connection (proxy-client) changes not only according to the window dynamics of TCP, but also according to the availability of packets (from the server-proxy connection), i.e., the first connection may not “catch up” with the second connection due to factors like

54

M. Liu and N. Ehsan

initial window size, transmission rate, etc.. Thus the window of the second connection may be forced to grow at a slower rate. In this paper, we only consider the case where the window of the proxy-client connection is not constrained by the server-proxy connection. This, in the lossless case implies that the proxy-client connection uses an initial window size same as or bigger than the server-proxy connection, and that the proxy transmission rate is not significantly higher than that of the server. This also implies that in general I2 > I1 , which is a reasonable assumption when the proxy-client link is a satellite link (for GEO satellite commonly used for data communication, the one-way propagation delay is 250 ms), but less accurate if it is a terrestrial wireless link. When loss is present, the implication is more complicated. The second connection can starve due to heavy congestion/loss on the server-proxy link regardless of the initial window size and propagation delay.

3 3.1

Latency Analysis Lossless Links

Under lossless situation, latency is mostly due to transmission delay, propagation delay, processing delay, and the time the server spent in waiting for the window to ramp up to fully utilize the link capacity. We first calculate the number of windows that is needed to cover a file of size M segment by extending the method introduced in [15]. Let w0 denote the initial window size, and therefore using slow start, the first window has w0 20 packets, the second window has w0 21 packets, and so on. (We do not consider delayed ACK in our analysis, although our model can be easily modified to take delayed ACK into account. For example, as shown in [16] assuming one ACK is generated for every b packets received before the timer expires, then the rate of exponential growth of the congestion window is r = 1 + 1b , which equals 2 when no delayed ACK is used.) Let S be such that S

w0 2S−1 < Wsst ≤ w0 2S ,

(1)

if M > i=1 w0 2i−1 , i.e., the ssthresh is achieved during the (S + 1)th window given enough data. Therefore the (S + 1)th window size is Wsst and the (S + 2)th window size is Wsst + 1, and so on. Similarly, let Mx be such that Wsst + Mx − S − 1 < Wmax ≤ Wsst + Mx − S,

(2)

i.e., the maximum window size is achieved during the (Mx + 1)th window if the file is big enough, and thus all subsequent windows have the same window size of Wmax . Therefore the number of windows needed to transfer a file is given by the following:  k  min{k : i=1 w0 2i−1 ≥ M } k≤S   k S  i−1 + i=S+1 (Wsst + i − S − 1) ≥ M } S < k ≤ Mx min{k : i=1 w0 2 S Mx K= (3) i−1  min{k : w 2 + i=S+1 (Wsst + i − S − 1) 0  i=1  k  + i=Mx +1 Wmax ≥ M } Mx < k

Modeling and Analysis of TCP Enhancement over Heterogeneous Links

55

1. End-to-End Connection. After transmitting each window, the server will stall to wait for the first acknowledgment of that window if it takes longer for the ACK to arrive than it takes to transmit the entire window. The time it takes to transmit the k th window is a function of the packet transmission time at the sender (µ1 in this case), which we denote by tk (·), is given by  if k ≤ S  w0 2k−1 µ1 tk (µ1 ) = (Wsst + k − S − 1)µ1 if S < k ≤ Mx . (4)  Wmax µ1 if Mx < k Therefore if µ1 ≥ µp , which indicates the case where the proxy transmits at least as fast as the server and thus packets will not experience queueing delay at the proxy, the total time it takes to transfer the file is Te (M ) = M µ1 +

K−1 

[µ1 + µp + 2(I1 + I2 ) − tk (µ1 )]+ + I1 + I2 + µp ,

(5)

k=1

where [a]+ = a for a positive and 0 otherwise. This latency reflects the total transmission time, the time that the server spends waiting for ACKs, and the time for the last window to reach the client. When µ1 < µp , packets could build up at the proxy waiting to be transmitted onto the slower link and therefore experience additional queueing delay at the proxy. In this case the ACKs of the same window arrive at the server approximately µp apart instead of µ1 , thus the server may need to wait for every ACK of the same window instead of stalling after sending out the entire window. The above stall time analysis therefore does not directly apply. We derive the latency by examining from the receiver (client) side. Since µp > µ1 , the client receives packets of the same window continuously at rate 1/µp . The time that the client is idle is therefore [µ1 + µp + 2(I1 + I2 ) − tk (µp )]+ , where tk (µp ) is the time it takes the client to receive the k th window, and tk (·) is given by (4). The latency is then Te (M ) = M µp +

K−1 

[µ1 + µp + 2(I1 + I2 ) − tk (µp )]+ + I1 + I2 + µ1 ,

(6)

k=1

which reflects the time the client spends receiving the file, waiting for the next packet, and the time for the first window to reach the client. (5) and (6) can be combined and written as Te (M ) = M max(µ1 , µp ) +

K−1 

[µ1 + µp + 2(I1 + I2 ) − tk (max(µ1 , µp ))]+

k=1

+I1 + I2 + min(µp , µ1 ).

(7)

2. Connection Splitting. As we have pointed out earlier, we consider the situation where the proxy transmission is not constrained by the availability of

56

M. Liu and N. Ehsan

packets from the server, i.e., I2 > I1 , µp ≥ µ1 , and that the server’s initial window size is greater or equal to that of the proxy. Since a larger initial window size of the server-proxy connection does not change the end-to-end latency (additional packets will simply be queued at the proxy), we assume both connections use the same initial window size. For initial window size w0 , we get S, Mx , and K from (1), (2) and (3) for both connections. The proxy receives the first packet from the server at time µ1 + I1 . Assuming there is tp delay for TCP processing, the proxy starts sending this packet to the client at time µ1 + I1 + tp . From this point on, we only need to focus on the second connection since the latency is only determined by this connection. By following the previous analysis, the total latency is Ts (M ) = µ1 + I1 + tp + M µp +

K−1 

[µp + 2I2 − tk (µp )]+ + I2 ,

(8)

k=1

where tk (·) is given in (4). This latency reflects the initial delay for the first packet to arrive at the proxy, the total transmission time at the proxy, stall time and the time for the last packet to reach the client. 5

8

4

6

3 4

2 2

0

1

0

5

10

15 4

x 10

0

0

5

10

15 4

x 10

Fig. 2. Both graphs show latency (in seconds, vertical) vs. file sizes (in bytes, horizontal), by using end-to-end connections (graph on the left), and using split connections (graph on the right). There are four curves in each of the two graphs, two for initial window size of 1 (dashed for model, solid for simulation) and two for initial window size of 4 (dotted for model and dash-dotted for simulation). In both cases our model matches very well with the simulation

3. Validation of the Model. Figure 2 compares our numerical results with NS simulation [17], for both end-to-end TCP and split TCP. In this case, C1 = Cp = C2 = 1 Mbps. The initial window size is set to 1 and 4, respectively. Unless pointed out explicitly, our numerical results throughout this paper are based on the following parameters: M SS = 512 bytes, I1 = 150 ms, I2 = 250 ms, ssthresh = 128 segments, Wmax = 256 segments. We see the curve from simulation and from our model almost overlap completely.

Modeling and Analysis of TCP Enhancement over Heterogeneous Links

57

4. Results and Analysis. In this section we show a sequence of results from our model illustrating the performance (in terms of latency) of end-to-end connection and split connection under various situations. Initial window size. Figure 3 shows the latency comparison between end-to-end connection and split connection when using different initial window size. The 5

14

ETE IW=1 ETE IW=2 ETE IW=8 SP IW=1 SP IW=2 SP IW=8

4.5

4

ETE IW=1 ETE IW=2 ETE IW=8 SP IW=1 SP IW=2 SP IW=8

12

10

3.5

3

8

2.5 6

2

1.5

4

1 2

0.5

0

0

1

2

3

4

5 4

x 10

0

0

2

4

6

8 5

x 10

Fig. 3. Both graphs shows latency (in seconds, vertical) vs. file sizes (in bytes, horizontal). “ETE” for end-to-end connection; “SP” for connection splitting; “IW” for initial window size, I1 = 100 ms, I2 = 250 ms, C1 = C2 = Cp = 1 Mbps

gain from using split connection is obvious in this case, although using endto-end connection with initial window size of 8 outperforms split connection with initial window size of 1 or 2, when the file size is below 200 Kbytes and 500 Kbytes, respectively. As the file becomes large enough to fully utilize the channel, the difference between Equations (7) and (8) stays constant, i.e., the summation term becomes fixed as M increases, and the rate of the growth is dominated by the term M µp . This means in a lossless situation, for relatively small files (e.g., < 100 Kbytes), the same level of latency achieved by using split connection can be achieved using end-to-end connection by increasing the inital window size. Delay ratio. Figure 4 compares the latency when using end-to-end connection and using split connection under different propagation delay of the server-proxy link (the delay of the proxy-client link is fixed at 250 ms). This result reflects the difference of the summation terms in equations (7) and (8). Proxy transmission rate. Figure 5 shows the impact of the forwarding rate of the proxy has on the file transfer latency. When the proxy is as fast as the server, the gain from using split connection is shown in ealier results. However, when the proxy becomes the bottleneck, the gain diminishes quickly for both file sizes, i.e., µp dominates in the summation terms in equations (7) and (8). A slower forwarding rate can be an approximation to a more congested proxy (increased

58

M. Liu and N. Ehsan 7.5

4.5

7 4

6.5

3.5

6

5.5

3

5 2.5

4.5

2

0

0.05

0.1

0.15

0.2

0.25

4

0

0.05

0.1

0.15

0.2

0.25

Fig. 4. Both graphs show latency (in seconds, vertical) vs. the propagation delay of the server-proxy link (in seconds, horizontal). File sizes fixed at 11 Kbytes and 110 Kbytes for the graphs on the left and right, respectively. Solid lines for end-to-end connection; dashed lines for connection splitting 4

12

3.8

11

10

3.6

9

3.4 8

3.2 7

3 6

2.8

5

2.6

2.4

4

0

2

4

6

8

10 5

x 10

3

0

2

4

6

8

10 5

x 10

Fig. 5. Both graphs show latency (in seconds, vertical) vs. Cp , the transmission rate of the proxy (in bits per second, horizontal). File sizes are 11 Kbytes and 51 Kbytes, for the graph on the left and right, respectively. C1 = C2 = 1 Mbps, and I1 = 100 ms, I2 = 250 ms in both cases. Solid line is for end-to-end connection, and the dashed line is for split connection

queueing delay, etc.), thus we see as the proxy becomes more congested the percentage gain in reduced latency becomes marginal. Persistent connection vs. non-persistent connection. We can also use our model to investigate the performance of different versions of HTTP. Using equations (7), (8) and adding the time spent in connection establishment (3(I1 + I2 ) in both cases), we can obtain the latency in downloading webpages using either persistent connection (HTTP/1.1) or non-persistent connection (HTTP/1.0). Figure 6 shows the comparison. We see that only in very limited regions do non-persistent connections perform better even when using split TCP. This is mainly due to the overhead in establishing separate connections, and that each connection is not long enough to fully utilize the channel.

Modeling and Analysis of TCP Enhancement over Heterogeneous Links

59

Fig. 6. Both graphs show latency (in seconds, vertical) vs. the number of objects in a base page. Each object is 10 Kbytes. The base page is also 10 Kbytes. Solid lines are for non-persistent connections using split TCP, and dashed lines are for persistent connection using end-to-end TCP. Graph on the left uses 5 paralell connections for nonpersistent connection; graph on the right uses 10 paralell connections for non-persistent connection. C1 = C2 = Cp = 1 Mbps

3.2

Links with Random Losses

The model presented in the previous section can be combined with the TCP steady-state analysis, e.g., [12] and [13], to investigate cases where losses occur mainly on the proxy-client link. This may not be a very realistic assumption even if the proxy-client link is terrestrial wireless since the server-proxy link is always subject to congestion losses, but it does guarantee that the proxy or the second connection will not starve, so that it can be modeled using an infinite source. (Due to space limit we are not able to include our model and analysis. It will appear in a separate paper.)

4

Discussion and Conclusion

In conclusion, we presented a model for analyzing the latency of file transfer when using end-to-end TCP connection and when using split TCP connections over heterogeneous links. We investigated the performance comparison between the two by varying inital window size, file size, the proxy transmission rate and the propagation delays. In general split TCP results in lower latency from our analysis, however for large file sizes, slower proxy, and small ratio of propagation delay between the two links, the improvement is reduced. As we pointed out ealier, when the proxy-client connection is constrained by the rate at which it receives packets from the server, the window will be forced to slow down and therefore yield larger file transfer latency. Characterizing the window dynamics under such constraint is a topic of our current research. On the other hand, when the server-proxy connection out-paces the proxy-client connection, packets will build up at the proxy. Characterizing the buffer dynamics at the proxy is another topic of our current research.

60

M. Liu and N. Ehsan

References 1. Pan, J.: Research: TCP over Something-Air Links - Wireless Links. http://bbcr.uwaterloo.ca/ jpan/tcpair 2. Bharadwaj, V.: Improving TCP Performance over High-Bandwidth Geostationary Satellite Links. Technical Report MS 99-12, Institute for Systems Research, University of Maryland, College Park (1999) http://www.isr.umd.edu/TechReports/ISR/1999/ 3. Bakre, A. V., Badrinath, B. R.: Implementation and Performance Evaluation of Indirect TCP. IEEE Trans. Computers 46(3) (1997) 260–278 4. Brown, K., Singh, S.: A Network Architecture for Mobile Computing. IEEE INFOCOM (1996) 1388–1396 5. Schiller, J.: Mobile Communications. Addison-Wesley (2000) 6. Ratnam, K., Matta, I.: WTCP: An Efficient Mechanism for Improving TCP Performance Over Wireless Links. Proc. IEEE ISCC (1998) pages 74–78 7. Iftode, I., C´ aceres, R.: Improving the Performance of Reliable Transport Protocol in Mobile Computing Environment. IEEE J-SAC, 13(5) (1995) 850–857 8. Vaidya, N. H., Mehta, M., Perkins, C., Montenegro, G.: Delayed Duplicated Acknowledgments: A TCP-Unware Approach to Improve Performance of TCP over Wireless. Technical Report 99-003, TAMU (1999) 9. Balakrishnan, H., Padmanabhan, V. N., Seshan, S., Katz, R. H.: Comparison of Mechanisms for Improving TCP Performance over Wireless Links. IEEE/ACM Trans. Networking, 5(6) (1997) 756–769 10. Parsa, C., Garcia-Luna-Aceves, J. J.: Improving TCP Performance Over Wireless Network at The Link Layer. ACM Mobile Networks & Applications Journal (1999) 11. Karir, M.: IPSEC and the Internet. Technical Report MS 99-14, Institute for Systems Research, University of Maryland, College Park (1999) http://http://www.isr.umd.edu/TechReports/ISR/1999/ 12. Cardwell, N., Savage, S., Anderson, T.: Modeling TCP Latency. IEEE INFOCOM (2000) 13. Padhye, J., Firoiu, V., Towsley, D. F., Kurose, J. F.: Modeling TCP Reno Performance: A Simple Model and Its Empirical Validation. IEEE Trans. Networking 8(2) (2000) 133–145 14. Lakshman, T. V., Madhow, U., Suter, B.: TCP Performance with Random Loss and Bidirectional Congestion. IEEE Trans. Networking 8(5) (2000) 541–555 15. Kurose, J. F., Rose, K.: Computer Networking, A Top-Down Approach Featuring the Internet. Addison Wesley (2000) 16. Allman, M., Paxson, V.: On Estimating End-to-end Network Path Properties. SIGCOMM (1999) 17. UCB/LBNL Network Simulator. http://www.isi.edu/nsnam/ns/

TCP Throughput Guarantee Using Packet Buffering Sunwoong Choi and Chongkwon Kim School of Computer Science and Engineering Seoul National University, Korea {schoi, ckim}@popeye.snu.ac.kr

Abstract. This paper deals with the TCP bandwidth guarantee problem in a Differentiated Services (Diffserv) network. Several researches proposed a RIO mechanism for the assured service. In RIO, IN packets experience lower drop probability than OUT packets to guarantee the promised bandwidth even under network congestion. However a token bucket marker fails to provide adequate performance to TCP connections because TCP generates bursty packets due to the unique TCP congestion control mechanism. We propose a new marker that uses a data buffer as well as a token buffer. The marker with a data buffer works well with RIO because it smooths TCP traffic. We show that the marker with a data buffer achieves the target throughput better than a marker with a token buffer only. We also show that the optimal data buffer size is proportional to reserved throughput and RTT.

1

Introduction

One of the most distinguishing features of the future Internet will be the QoS support capability. The traditional TCP/IP Internet provides best-effort packet delivery service. However, the future Internet will support diverse applications that require stringent or loose QoS guarantee. The mechanisms to support QoS in packet switched network have been actively studied in last 10 years and many clever methods and algorithms were proposed. In IETF, at least two approaches including Intserv and Diffserv were proposed for the QoS guarantee network architecture. The Intserv (Integrated Services) architecture provides strict QoS guarantee using signaling and end-to-end resource reservation [1]. Before sending information, a subscriber must reserve buffer and bandwidth at each link on the path from the source to the destination using a signaling protocol such as RSVP [2]. Then the intermediate routers maintain the reservation states and handle packets after flow classification. The Intserv architecture may suffer from scalability problem [3], [4]. A flow is defined by a [source IP address, destination IP address, source port number, destination port number, protocol] tuple. More than 

This work is supported in part by the Ministry of Information & Communication of Korea and the Brain Korea 21 Project in 2000.

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 61–70, 2001. c Springer-Verlag Berlin Heidelberg 2001 

62

S. Choi and C. Kim

100,000 active flows may exist in a backbone router simultaneously. The overhead of maintaining of a separate queues, state information for each flow and per- packet scheduling may prevent the deployment of the Intserv architecture in large-scale public network [3], [4]. The Diffserv (Differentiated Services) architecture improves the scalability by removing the per-flow state management or packet processing burden at core routers. All functions that require per-flow treatment such as classification, marking, policing and shaping are performed at edge routers [3], [4], [5], [6]. Compared to a core router, an edge router has fewer active flows and packet arrivals. An edge router aggregates flow into a small number of QoS classes and monitors if each flow obeys the promised traffic generation pattern. An edge router marks a conformed packet as an IN packet and marks a non-conformed packet as OUT. The DS codepoint in the IP header records the QoS class and IN/OUT mark of each packet. A core router treats packets according to the DS codepoint and PHB (Per Hop Behavior). We can implement service models on the general Diffserv QoS architecture. The service models that may be implementable are the PS (Premium Service) model and the AS (Assured Service) model. The PS emulates the leased line by transferring PS packets before other packets [5]. A core router may use priority queue to implement the PS. The AS provides loose bandwidth guarantee without explicit reservation. The RIO (RED with IN and OUT) mechanism was proposed to support the AS at a core router [6]. The concept of the AS model, providing throughput guarantee without explicit resource reservation, is rather new and many researchers studied the effective mechanism for the AS. The mechanism for the AS consists of two methods: One is buffer management methods and the other is packet marking methods at edge routers. RIO, which allocates different packet drop probabilities to IN and OUT packets, was the first proposed buffer management method and has received great attentions [6]. Later, several other buffer management mechanisms were proposed to enhance the performance of RIO. These mechanisms include ERED (Enhanced RED) [7], (r, RTT)-adaptive buffer management, and Dynamic RIO (DRIO) [8]. Compared to buffer management schemes, less research attention has been given to packet marking methods. Most prior work adopted simple packet regulating methods such as leaky bucket, and TSW (Time Sliding Window) [6]. Recently, Lin et al. proposed ETSW (Enhanced TSW) [8]. We address mechanisms to improve the performance of TCP connection in the AS architecture. Considerable efforts have been made to develop performance enhancement mechanism in last three years [7], [8], [9], [10]. Some of proposed methods were successful. However, many of them require non-trivial modification of the current TCP. Some of them rely on the interaction between network elements and the TCP protocol. These methods are harder to deploy than a method that works with the current TCP. We aim to develop a method that does not require TCP modification. In this paper, we focus on the packet marking mechanism. We propose to use a data buffer in addition to a token buffer in the packet marker. To the best

TCP Throughput Guarantee Using Packet Buffering

63

of our knowledge, no published work proposed to use a data buffer in the AS architecture. Note that the data buffer does not require TCP modification and works with the current TCP. The data buffer reduces the burstiness of the TCP packet generation process. The data buffer is not without drawbacks. Buffering brings unnecessary delays. The buffering delay increases in proportion to the data buffer size. A large data buffer increases the RTT and may degrade TCP performance because TCP throughput decreases as the RTT increases [11]. Therefore, we should exercise care in determining the optimal data buffer size. We examined the performance of the proposed method via computer simulation. Simulation results show that TCP connections achieve throughput closer to the target throughput with the new packet marker than with a token bucket based packet marker. We also investigated the optimal data buffer size varying the subscription level, the reserved bandwidth, and RTT. We observed that the benefit of the packet buffering increases as the subscription level grows. The optimal data buffer size is proportional to the reserved bandwidth and RTT. The rest of the paper is organized as follows. In Section 2, we define the notion of the target bandwidth and explain the collision between TCP congestion control mechanism and the assured service mechanism. We explain the new packet marker in detail and discuss the effect of the packet buffering in Section 3. Section 4 contains extensive performance analysis. In addition to the performance comparison of the new method to existing method, we analyse the effect of data buffer size on the performance. We conclude the paper in Section 5.

2

Background

The AS architecture aims to provide throughput guarantee. To examine the issue of bandwidth sharing, we define target bandwidth. The computation of target bandwidth is quite straightforward as follows. Let ri be the reserved bandwidth of flow i, C be thecapacity of a bottleneck n link, and n be the number of flows. The bandwidth of i=1 nri is reserved for IN packets. The surplus bandwidth at this link is then (C − i=1 ri ). This surplus bandwidth should be evenly shared by all the flows. Hence, the target bandwidth of flow i, ti is given by n (C − i=1 ri ) ti = ri + . (1) n 2.1

Collision between TCP Congestion Control and the Current AS Mechanism

Current AS architecture interferes with the TCP congestion control mechanism and may not allocate promised bandwidth to TCP subscribers [7], [8], [9]. TCP congestion control is an AIMD model and the cwnd size fluctuates in a typical sawtooth pattern. When a TCP packet generation rate is smaller than the reserved bandwidth, the TCP connection cannot use the allocated bandwidth. If

64

S. Choi and C. Kim

S1

D1

10 Mb

10 Mb

S2

D2

R0

R1

Sn

Dn

Fig. 1. Simulation Topology

a TCP connection increases its cwnd and generates more packets than reserved bandwidth, some packets are marked as OUT packets that will experience high drop probability. If one of them is discarded, then TCP reduces its cwnd size by half. As a result, a TCP connection may be not compensated for the loss of the reserved bandwidth during the under-utilization state. The loss of the reserved bandwidth also results from the burstiness of TCP traffic. There are persistent gaps in the ack (acknowledgement) stream. Such gaps are commonly referred to as ack compression [12]. Since TCP uses ack to trigger transmissions, significant gaps in the acks cause the token buffer to overflow. The overflow of the token buffer results in a loss of reserved bandwidth. Thus the token bucket marker fails to allocate the promised rate to a bursty flow. In this paper, we focus on how to avoid the performance degradation due to the burstiness of TCP traffic. It is not a good solution that we use a marker with a large token buffer. Even though large token buffer can prevent the token loss, it may generate many IN packets consecutively. IN packet burst may result in the loss of IN packets. Because the frequent loss of IN packet threatens the AS architecture, the size of the token buffer should be restricted.

3

Packet Buffering

In this section we address the packet buffering mechanism to improve the performance of TCP connection in the AS architecture and study its effect. We explain the problem of the token bucket marker and the rationale of the packet buffering. We evaluate the performance of the packet buffering using ns simulator [13]. We consider a simple topology with TCP Reno hosts. The network topology is shown in Figure 1, which is similar to that used in [8], [9]. There are two routers R0 and R1. All senders are connected to router R0 and all receivers are connected to router R1; all connections share one bottleneck link between R0 and R1. We use the token buffer whose size is the product of the reserved bandwidth and RTT. R0 and R1 maintain queues with size of 100 packets and

TCP Throughput Guarantee Using Packet Buffering 30

Tokens Lost Tokens Congestion Window

25

Seqno/Token(mod 30)

65

20

15

10

5

0

0

0.5

1

1.5

2

Time (sec)

Fig. 2. The behavior of token bucket marker and TCP source

use RIO algorithm. The two thresholds and the dropping probability used for IN and OUT packets in RIO are 20/80/0.02 and 20/50/0.1, respectively. All senders are ftp sources, that is, they always have data to send. 3.1

Problem of the Token Bucket Marker

We examine the behavior of the token bucket marker and TCP source in the following experiment environment. There are six AS TCP flows and six best effort TCP flows. Each AS flow reserves 1Mbps bandwidth and the capacity of the bottleneck link is 10Mbps. The size of the token buffer is same as 7 packets. Figure 2 shows the TCP congestion window of the sender, the number of lost tokens (given in packets modulo 30) for the connection and the number of tokens in the token buffer. We can observe that TCP flow suffers from the crucial token loss. The TCP congestion control mechanism is partly responsible for this phenomenon. Because TCP congestion control is an AIMD model, the cwnd size fluctuates in a typical sawtooth pattern. Thus, even when tokens exist, TCP sender may be throttled by the congestion window. As shown in Figure 2, many tokens are lost when cwnd size is small. Another cause for token loss is the presence of persistent gaps in the ack stream. We can observe that TCP cwnd size increases in shape of stair in Figure 2. It is because sender receives acks at burst. Since TCP uses acks to trigger transmissions, such burstiness of ack stream causes a token loss. 3.2

Token Bucket Marker with Data Buffer

We propose to use a data buffer in additional to a token buffer in the packet marker to reduce the token loss. The marker with a data buffer stores a received packet when there are no tokens. If a new token is generated, the first packet in

66

S. Choi and C. Kim 30

Tokens Congestion Window

Seqno/Token(mod 30)

25

20

15

10

5

0

0

0.5

1

1.5

2

Time (sec)

Fig. 3. The behavior of packet marker with a data buffer of size 3 packets and TCP source

the data buffer is transmitted as IN packet. If a data buffer overflows, the first packet in the data buffer is transmitted as OUT packet. The data buffer reduces the burstiness of the TCP packet generation process. Figure 3 shows the behavior of the marker with a data buffer and cwnd size of TCP sender. We used a data buffer with size of 3 packets. We can observe that due to the smoothing effect of the data buffer, TCP cwnd size increases smoothly and few tokens are lost. Because the data buffer lessens the token losses, it provides flows with IN marking rate closer to the reserved bandwidth than the token bucket buffer. In [14], Aggarwal studied the TCP pacing mechanism which transmits the packets evenly. A packet of paced TCP flow tends to be dropped due to the impact of other bursty flows. On the other hand, the packet of a bursty flow is dropped with the relatively small probability. From this reason, the paced TCP shows the degraded performance than the TCP Reno. However, the packet smoothing does not deteriorate the performance of TCP flow in the AS network. Because the IN packet is transmitted successfully for the most part regardless of the other flows, the packet buffering can improve the performance of AS TCP flow.

4

Evaluation Result

We study the performance of the packet buffering via computer simulation and exercise care in determining the optimal data buffer size. We investigate the optimal data buffer size varying the subscription level, the reserved bandwidth, and RTT.

TCP Throughput Guarantee Using Packet Buffering 1.25

67

Throughput IN

1.2

Bandwidth(Mbps)

1.15

1.1

1.05

1

0.95

0.9

0.85

0

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

Size of the Data Buffer(packets)

Fig. 4. The effect of the data buffer size

4.1

Effect of the Data Buffer Size

Simulation results show that TCP connections achieve throughput closer to the target throughput with the new packet marker than with a marker using a token buffer only. The performance of the new packet marker depends on the size of the data buffer. Figure 4 shows IN packet transmission rate and achieved throughput including both IN and OUT transmission rate of a TCP flow, which reserves 1 Mbps. There are six markers with a data buffer of a different size: 0, 1, 2, 4, 8, and 16. The marker with token buffer only is the case where the size of data buffer is zero. Two important observations are visible in this figure. First, as the size of data buffer grows, IN packet transmission rate gets closer to the reserved bandwidth. It is because the data buffer reduces the burstiness of the TCP packet generation process and lessens the token losses. Note that the token buffer also can alleviate the problem of token loss. However, it is only when the token buffers are very large and the use of large token buffer allows large bursts of IN packets into the network that can result in loss of IN packets, thus defeating the service differentiation mechanism provided by RIO [7]. The second observation is that data buffer improves the performance of TCP flow, but too large data buffer may degrade TCP performance. The data buffer reduces token losses, but brings additional delays. Although the data buffer provides a TCP flow with IN packet transmission rate closer to the reserved bandwidth, a large data buffer increases the RTT and may degrade TCP performance. Therefore, it is important to determine the optimal data buffer size.

68

S. Choi and C. Kim

Fig. 5. The effect of the subscription level

4.2

Effect of the Subscription Level

We examine the impact of the subscription level on the performance of the proposed method. We performed a experiment varying the capacity of the bottleneck link into 20Mbps, 10Mbps, 6.67Mbps, and 5Mbps. Since the sum of the reserved bandwidth is 6Mbps, the subscription level is 30%, 60%, 90%, and 120% respectively. We can see that the optimal data buffer size is larger as the subscription level grows in Figure 5. It relates to the drop probability of OUT packets. When the subscription level is low, OUT packets are dropped in a low probability as well as IN packets. Therefore the benefit of the packet buffering increases as the subscription level grows. 4.3

Effect of the Reserved Bandwidth

This experiment is designed to investigate the impact of the reserved bandwidth on the performance of the proposed method. For this study we ran the eight AS TCP flows with reservations of 2Mbps, 1Mbsp, 0.5Mbps, and 0.1Mbps, and two best effort TCP flows. The capacity of the bottleneck link is 12Mbps and the bandwidth of 7.2Mbps is reserved for IN packets. Figure 6 shows the throughput according to the reserved bandwidth and the data buffer size. We can see that the token bucket marker provides too much bandwidth to the flow with the small reserved bandwidth and provides too small bandwidth to the flow with the large reserved bandwidth. Compared to the token bucket marker, the marker with a data buffer provides the throughput closer to the target bandwidth. We can observe that the optimal data buffer size varies according to the reserved bandwidth. The optimal data buffer size is proportional to the reserved bandwidth. Because the reserved bandwidth is equal to the token generation

TCP Throughput Guarantee Using Packet Buffering

69

Fig. 6. The effect of the reserved bandwidth

rate, the packet buffering delay decreases as the reserved bandwidth increases. It is the reason that the optimal data buffer size is proportional to the reserved bandwidth. 4.4

Effect of the RTT

We also examine the impact of RTT on the performance of the proposed method. For this purpose, we performed the experiment where there are eight AS TCP flows and eight best effort TCP flow with the different RTT of 10, 20, and 40ms. Each AS TCP flow reserves 1Mpbs and the capacity of the bottleneck link is 14Mbps. The result of the experiment is shown in Figure 7. We can see that the optimal data buffer size is proportional to the RTT of a flow. The reason is that TCP throughput decreases as the RTT increases [11]. If the packet buffering delay is constant, the performance degradation is severer as RTT grows.

5

Conclusions

In the paper, we have addressed mechanism to improve the performance of TCP flow in the AS architecture using the packet buffering. We proposed a new marker that uses a data buffer in addition to a token buffer. We presented that the marker with a data buffer achieved the target throughput better than a marker with a token buffer only. We also showed that the optimal data buffer size is proportional to the reserved bandwidth and RTT, and the benefit of the packet buffering increases as the subscription level grows. Further study is required to infer the optimal data buffer size. We are now modeling the packet buffering mechanism to infer the optimal data buffer size. We expect to describe the effect of the packet buffering more accurately.

70

S. Choi and C. Kim

Fig. 7. The effect of RTT

References 1. R. Braden, D. Clark, S. Shenker, “Integrated Services in the Internet Architecture: An Overview,” RFC 1633, Jun., 1994 2. L. Zhang, S. Deering, D. Estrin, S. Shenker, D. Zappala, “RSVP: A New Resource ReSerVation Protocol,” Transaction on Networking, Sep., 1993 3. S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, W. Weiss, “An Architecture for Differentiated Services,” RFC 2475, Dec., 1998 4. X. Xiao, L. Ni, “Internet QoS: the Big Picture,” IEEE Network, Mar./Apr., 1999 5. K. Nichols, V. Jacobson, L. Zhang, “A Two-bit Differentiated Services Architecture for the Internet,” RFC 2638, Jul., 1999 6. D. Clark, W. Fang, “Explicit Allocation of Best Effort Delivery Service,” Transactions on Networking, Aug. 1998 7. W. Feng, D. Kandlur, D. Saha, K. Shin, “Understanding and Improving TCP Performance over Networks with Minimum Rate Guarantees,” Transactions on Networking, Apr., 1999 8. W. Lin, R. Zheng, J. C. Hou, “How to Make Assured Services More Assured,” ICNP’99 9. I. Yeom, A. Reddy, “Realizing throughput guarantees in a differentiated services network,” ICMCS’99 10. W. Feng, D. Kandlur, D. Saha, K. Shin, “Adaptive Packet Marking for Providing Differentiated Services in the Internet,” ICNP ’98 11. J. Padhye, V. Firoiu, D. Towsley, J. Kurose, “Modeling TCP throughput: A simple model and its empirical validation,” SIGCOMM’98 12. L. Zhang, S. Shenker, D. Clark, “Observations on the Dynamics of a Congestion Control Algorithm: The Effects of Two-Way Traffic,” SIGCOMM’91 13. UCB, LBNL, VINT Network Simulator ns http://wwwmash.cs.berkeley.edu/ns/ns.html 14. A. Aggarwal, S. Savage, T. Anderson, “Understanding the Performance of TCP Pacing,” INFOCOM’2000

Modular TCP Handoff Design in STREAMS-Based TCP/IP Implementation Wenting Tang1 , Ludmila Cherkasova1 , Lance Russell1 , and Matt W. Mutka2 1

2

Hewlett-Packard Labs, 1501 Page Mill Road, Palo Alto, CA 94303, USA, wenting,cherkasova,[email protected] Dept of Computer Science & Eng., Michigan State Universsity, East Lansing, MI 48824, USA, [email protected]

Abstract. Content-aware request distribution is a technique which takes into account the content of the request when distributing the requests in a web server cluster. A handoff protocol and TCP handoff mechanism were introduced to support content-aware request distribution in a client-transparent manner. Content-aware request distribution mechanisms enable the intelligent routing inside the cluster to provide the quality of service requirements for different types of content and to improve overall cluster performance. We propose a new modular TCP handoff design based on STREAMSbased TCP/IP implementation in HP-UX 11.0. We design the handoff functions as dynamically loadable modules. No changes are made to the existing TCP/IP code. The proposed plug-in module approach has the following advantages: flexibility-TCP handoff functions may be loaded and unloaded dynamically, without node function interruption; modularity- proposed design and implementation may be ported to other OSes with minimal effort.

1

Introduction

The web server cluster is the most popular configuration used to meet the growing traffic demands imposed by the World Wide Web. However, for clusters to be able to achieve scalable performance as the cluster size increases, it is important to employ the mechanisms and policies for a “balanced” request distribution. The market now offers several hardware/software load-balancer solutions that can distribute incoming stream of requests among a group of web servers. Typically, the load-balancer sits as a front-end node on network and acts as a gateway for incoming connections (we often will call this entity a distributor). Incoming client requests are distributed more or less evenly to a pool of servers (back-end nodes). Traditional load balancing solutions for a web server cluster try to distribute the requests among the nodes in the cluster based on some load information without regard to the requested content and therefore forwarding the client requests to a back-end node prior to establishing a connection with the client. P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 71–81, 2001. c Springer-Verlag Berlin Heidelberg 2001 

72

W. Tang et al.

Content-aware request distribution takes into account the content (such as URL name, URL type, or cookies) when making a decision to which server the request is to be routed. Previous work on content-aware request distribution [4,5,1,2] has shown that policies distributing the requests based on cache affinity lead to significant performance improvements compared to the strategies taking into account only load information. HTTP protocol relies on TCP - a connection-oriented transport protocol. The front-end node (the request distributor) must establish a connection with the client to inspect the target content of a request prior to asssigning the connection to a back-end web server. A mechanism is needed to service the client request by the selected back-end node. Two methods were proposed to distribute and service the requests on the basis of the requested content in a client-transparent manner: the TCP handoff [4] and the TCP splicing. [3]. Back-End

Client

a)

Back-End

Client

Front-End

Back-End

Front-End

b)

Back-End

Fig. 1. Traffic flow with a) TCP splicing; b) TCP handoff.

TCP splicing is an optimization of the front-end relaying approach, with the traffic flow represented in Figure 1 a). The TCP handoff mechanism was introduced in [4] to enable the forwarding of back-end responses directly to the clients without passing through the frontend, with traffic flow represented in Figure 1 b). The main idea behind the TCP handoff is to migrate the created TCP state from the distributor to the back-end node. The TCP implementation running on the front-end and backends needs a small amount of additional support for handoff. In particular, the protocol module needs to support an operation that allows the TCP handoff protocol to create a TCP connection at the back-end without going through the TCP three-way handshake with the client. Similar, an operation is required that retrieves the state of an established connection and destroys the connection state without going through the normal message handshake required to close a TCP connection. Once the connection is handed off to a back-end node, the front-end must forward packets from the client to the appropriate back-end node. This difference in the response flow route allows substantially higher scalability of the TCP handoff mechanism than TCP splicing. In [1], authors compared performance of both mechanisms showing the benefits of the TCP handoff schema. Their comparison is based on the implementation of the TCP handoff mechanism in FreeBSD UNIX.

Modular TCP Handoff Design in STREAMS-Based TCP/IP Implementation

73

In this work, we consider a web cluster in which the content-aware distribution is performed by each node in a web cluster. Each server in a cluster may forward a request to another node based on the requested content (using TCP handoff mechanism). STREAMS-based TCP/IP implementations, which are available in leading commercial operating systems, offers a framework to implement the TCP handoff mechanism as plug-in modules in the TCP/IP stack, and to achieve the flexibility and portability without too much performance penalty. As part of the effort to support a content-aware request distribution for web server clusters, we propose a new modular TCP handoff design. The proposed TCP handoff design is implemented as STREAMS modules. Such a design has the following advantages: – portability: the STREAMS-based TCP/IP modules are relatively independent of the implementation internals. New TCP handoff modules are designed to satisfy the following requirements: • all the interactions between TCP handoff modules and the original TCP/IP modules are message-based, no direct function calls are made. • TCP handoff modules do not access and/or change any data structures or field values maintained by the original TCP/IP modules. This enables maximum portability, so that the TCP handoff modules may be ported to other STREAMS-based TCP/IP implementation very quickly. – flexibility: TCP handoff modules may be dynamically loaded and unloaded as DLKM (Dynamically Loadable Kernel Module) modules without service interruption. – transparency: no application modification is necessary to take advantage of the TCP handoff mechanism. This is a valuable feature for some applications where no source code is available. – efficiency: the proposed TCP handoff modules are only peeking into the messages, with minimal functionality replicated from the original TCP/IP modules.

2

Cluster Architectures and Request Distribution Mechanisms

Different products have been introduced in the market for load balancing. Popular Round-Robin DNS solutions [8] distribute the accesses among the nodes in the cluster in the following way: for a name resolution it returns the IP address list (for example, list of nodes in a cluster which can serve this content), placing a different address first in the list for each successive request. RoundRobin DNS is available as part of DNS which is already in use, i.e. there is no additional cost. Other traditional load balancing solutions for a web server cluster try to distribute the requests among the nodes in the cluster without regard to the requested content and therefore forwarding client requests to a back-end node

74

W. Tang et al.

Back-end web server choice is based on load information only!

3-way handshaking connection setup IP_1

Client1 Server response path

NAT LB

IP_0

...

...

Internet

IP_2

IP_3

Virtual Cluster IP Client2 Request Response

IP_4 Web server cluster

Fig. 2. Traditional load balancing solution (like Cisco’s Local Director) in a web server cluster.

prior to establishing a connection with the client as shown in Figure 2. In this configuration, web server cluster appears as a single host to the clients. To the back-end web servers, the front-end load-balancer appears as a gateway. In essence, it intercepts the incoming web requests and determines which web server should get each one. Making that decision is the job of the proprietary algorithms implemented in these products. This code can take into account the number of servers available, the resources (CPU speed and memory) of each, and how many active TCP sessions are being serviced, etc. The balancing methods across different load-balancing servers vary, but in general, the idea is to forward the request to the least loaded server in a cluster. Only the virtual address is advertised to the Internet community, so the load balancer also acts as a safety net. The IP addresses of the individual servers are never sent back to the web browser. The load-balancer rewrites the virtual cluster IP address to a particular web server IP address using Network Address Translation (NAT). Because of this IP address rewriting, both inbound requests and outbound responses pass through the load-balancer. The 3-way handshaking and the connection set up with original client is the responsibility of the chosen back-end web server. After the connection is established, the client sends to this server the HTTP request with specific URL to retrieve. Content-aware request distribution intends to take into account the content (such as URL name, URL type, or cookies) when making a decision to which server the request has to be routed. The main technical difficulty of this approach is that it requires the establishment of a connection between the client and the request distributor. So the client will send the HTTP request to the distributor. The distributor can then make a decision to which back-end web server this request will be forwarded.

Modular TCP Handoff Design in STREAMS-Based TCP/IP Implementation

75

Back-end web server choice is based on content and load information! Optimized server response path

IP_1

Client1 TCP handoff to predefined server

Client2

IP_0 Virtual Cluster IP 3-way handshaking connection setup

Request Response

...

...

Internet

IP_2

Distributor IP_3

IP_4 Web server cluster

Fig. 3. Content-aware request distribution solution (front-end based configuration) in a web server cluster.

Thus, 3-way handshaking and the connection set up between the client and request distributor happens first, as shown in Figure 3. After that, backend web server is chosen based on the content of the HTTP request from the client. To be able to distribute the requests on the basis of requested content, the distributor component should implement either a form of TCP handoff [4] or the splicing mechanism [3]. Figure 3 shows request and response flow in case of TCP handoff mechanism. In this configuration, the typical bottleneck is due to the front-end node which performs the functions of distributor. For realistic workloads, a front-end node, performing the TCP handoff, does not scale far beyond four cluster nodes [1]. Most of the overhead in this scenario is incurred by the distributor component. Thus, another recent solution proposed in [1] is shown in Figure 4. It is based on alternative cluster design where the distributor is co-located with the web server. We will call this architecture CARD (Content-Aware Request Distribution). For simplicity, we assume that the clients directly contact the distributor, for instance via RR-DNS. In this case, the typical client request is processed in the following way. 1) Client web browser uses TCP/IP protocol to connect to the chosen distributor; 2) the distributor component accepts the connection and parses the request, and decides on server assignment for this request; 3) the distributor hands off the connection using TCP handoff protocol to the chosen server; 4) the server application at the server node accepts the created connection; 5) the server sends the response directly to the client. The results in [1] show good scalability properties of the CARD architecture when distributing requests with the LARD policy [4]. The main idea behind LARD is to partition the documents logically among the cluster nodes, aiming

76

W. Tang et al.

Each node performs request distribution function via TCP handoff mechanism!

3-way handshaking connection setup IP_1

TCP handoff to predefined server

...

Internet

Optimized server response path

IP_2

...

Client1

IP_3

Client2 Request Response

IP_4 Web server cluster

Fig. 4. Content-aware request distribution solution (cluster based, distributed configuration) in a web server cluster.

to optimize the usage of the overall cluster RAM. Thus, the requests to the same document will be served by the same cluster node that will most likely have the file in RAM. Our TCP handoff modules are designed to support a content-aware request distribution for the CARD implementation shown in Figure 4.

3

STREAMS and STREAMS-Based TCP/IP Implementation

STREAMS is a modular framework for developing the communication services. Each stream has a stream head, a driver and multiple optional modules between the stream head and the driver (see Figure 5 a). Modules exchange the information by messages. Messages can flow in two directions: downstream or upstream. Each module has a pair of queues: write queue and read queue. When a message passes through a queue, the service routine for this queue may be called to process the message. The service routine may drop a message, pass a message, change the message header, and generate a new message. The stream head is responsible for interacting with the user processes. It accepts the process request, translates it into appropriate messages, and sends messages downstream. It is also responsible for signaling to the process when new data arrives or some unexpected event happens. The STREAMS modules for STREAMS-based TCP/IP implementation are shown in Figure 5 b). Transport Provider Interface (TPI) specification [7] defines the message interface between TCP and the upper module. Data Link Provider Interface (DLPI) specification [6] defines the message interface between driver

Modular TCP Handoff Design in STREAMS-Based TCP/IP Implementation

user process

77

TPI module

Stream head TPI

UpperTCP

TCP module

Stream head

TCP module

Downstream Module

IP module

(optional)

DLPI Driver

Upstream Driver

a)

b)

BottomTCP

c)

IP module

Fig. 5. a) STREAMS b) STREAMS-Based TCP/IP Implementation c) New Plug-in Modules for TCP Handoff in STREAMS-Based TCP/IP Implementation

and the IP module. These specifications define the message format, valid sequences of messages, and semantics of messages exchanged between these neighboring modules. When the TCP module receives a SYN request for establishing the HTTP connection, the TCP module sends a T CONN IND message upstream. Under the TPI specification, TCP should not proceed until it gets the response from the application layer. However, in order to be compatible with BSD implementationbased applications, the TCP module continues the connection establishment procedure with the client. When the application decides to accept the connection, it sends the T CONN RES downstream. It also creates another stream to accept this new connection, and TCP module attaches the TCP connection state to this new stream. The data exchange continues on the accepted stream until either end closes the connection.

4

Modular TCP Handoff Design

The TCP handoff mechanism (shown in Figure 1 b) enables the response forwarding from the back-end web server nodes directly to the clients without passing through the distributing front-end. In the CARD architecture, each node performs both front-end and back-end functionality: the distributor is co-located with the web server. We use the following denotations: the distributor-node accepting the original client connection request is referred to as FE (Front-End). In the case where the request has to be processed by a different node, thenode receiving the TCP handoff request is referred to as BE (Back-End). Two new modules are introduced to implement the functionality of TCP handoff as shown in Figure 5 c). According to the relative position in the existing

78

W. Tang et al.

TCP/IP stack, we refer to the module right on top of the TCP module in the stack as UTCP (UpperTCP), and the module right under the TCP module as BTCP (BottomTCP). These two modules provide a wrapper around the current TCP module. In order to explain the proposed modular TCP handoff design and its implementation details, we consider typical client request processing. There are two basic cases: remote request processing, i.e. when the front-end node accepting the request must handoff the request to a different back-end node assigned to process this request; local request processing, i.e. when the front-end node accepting the request is the node which is assigned to process this request. First, we consider the remote request processing. There are six logical steps to perform the TCP handoff of the HTTP request in the CARD architecture: 1) finish 3-way TCP handshaking (connection establishment), and get the requested URL; 2) make the routing decision: which back-end node is assigned to process the request; 3) initiate the TCP handoff process with the assigned BE node; 4) migrate the TCP state from FE to BE node; 5) forward the data packets; 6) terminate the forwarding mode and release the related resources on FE after the connection is closed. Now, we describe in detail how these steps are implemented by the newly added UTCP and BTCP modules and original TCP/IP modules in the operating system. – 3-way TCP handshake Before the requested URL is sent to make a routing decision, the connection has to be established between the client and the server. The proposed design depends on the original TCP/IP modules in the current operating system to finish the 3-way handshaking functionality. In this stage, BT CPF E allocates a connection structure corresponding to each connection request upon receiving a TCP SYN packet from the client. After that, BT CPF E sends the SYN packet upstream. Upon receiving a downstream TCP SYN/ACK packet from the T CPF E module, BT CPF E records the initial sequence number associated with the connection, and sends the packet downstream. After BT CPF E receives an ACK packet from the client, it sends the packet upstream to T CPF E . During this process, the BT CPF E emulates the TCP state transitions and changes its state accordingly. In addition to monitoring the 3-way TCP handshaking, BT CPF E keeps a copy of the incoming packets for connection establishment (SYN packet, ACK to SYN/ACK packet sent by the client) and URL (Figure 6), for TCP state migration purpose, which is discussed later. Also, because the TCP handoff should be transparent to server applications, the connection should not be exposed to the user level application before the routing decision is made. U T CPF E intercepts the T CONN IND message sent by T CPF E . T CPF E continues the 3-way handshaking without waiting for explicit messages from the modules on top of TCP.

Modular TCP Handoff Design in STREAMS-Based TCP/IP Implementation

Front-End

79

Back-End Control Connection

TCP

UTCP

1

5

HandoffAck

7

Termination

TCP SYN

2

BTCP SYN

ACK

3

4 ACK

Handoff SYN ACK

SYN/ACK

UTCP

BTCP

URL

IP

IP URL

6

Network

Fig. 6. Remote Request Processing Flow During TCP Handoff Procedure

– URL parsing BT CPF E parses the first data packet from the client, retrieves the URL and makes the distribution decision. – TCP handoff initiation A special communication channel is needed to initiate the TCP handoff between FE and BE. A Control Connection is used for this purpose between two U T CPF E and U T CPBE as shown in Figure 6. This control connection is a pre-established persistent connection set up during the cluster initialization. Each node is connected to all other nodes in the cluster. The TCP handoff request is sent over the control connection to initiate the handoff process. Any communication between BT CPF E and BT CPBE modules goes through the control connection by sending the message to the U T CP module first (see Figure 6). After BT CPF E decides to handoff the connection, it sends a handoff request to the BT CPBE (Figure 6, step 1). The SYN and ACK packets from the client and the TCP initial sequence number returned by T CPF E are included in the message. BT CPBE uses the information in the handoff request to migrate the associated TCP state ( steps 2-4 in Figure 6, which are discussed next). If BT CPBE successfully migrates the state, an acknowledgement is returned (Figure 6, step 5). BT CPF E frees the halfopen TCP connection upon receiving the acknowledgement by sending a RST packet upstream to T CPF E and enters forwarding mode. U T CPF E

80

W. Tang et al.

discards corresponding T CONN IND message when the T DISCON IND is received from the T CPF E . – TCP state migration In the STREAMS environment it is not easy to get the current state of a connection at T CPF E , to transfer it and to replicate this state at T CPBE . First it is difficult to obtain the state out of the black box of the TCP module. Even if this could be done, it is difficult to replicate the state at BE. TPI does not support schemes by which a new half-open TCP connection with predefined state may be opened. In the proposed design, the half-open TCP connection is created by replaying the packets to the T CPBE by the BT CPBE . In this case, the BT CPBE acts as a client(Figure 6). BT CPBE uses the packets from BT CPF E , updates the destination IP address of SYN packet to BE and sends it upstream (Figure 6, step 2). T CPBE responds with SYN-ACK(Figure 6, step 3). BT CPBE records the initial sequence number of BE, discards SYN-ACK, updates the ACK packet header properly, and sends it upstream (Figure 6, step 4). – Data forwarding After the handoff is processed successfully, BT CPF E enters a forwarding mode. It forwards all the pending data in BT CPF E , which includes the first data packet (containing the requested URL) (Figure 6, step 6). It continues to forward any packets on this connection until the forward session is closed. During the data forwarding step, BT CPF E updates (corrects) the following fields in the packet: 1) the destination IP address to BE’s IP address; 2) the sequence number of the TCP packet; 3) the TCP checksum. For data packets that are sent directly from BE to the client, the BT CPBE module updates (corrects): 1) the source IP address to FE’s IP address; 2) the sequence number; 3) TCP checksum. After that, BT CPBE sends the packet downstream. – Handoff connection termination The connection termination should free states at BE and FE. The data structures at BE is closed by the STREAMS mechanism. BT CPBE monitors the status of the handoffed connection and notifies the BT CPF E upon the close of the handoffed connection in T CPBE (Figure 6, step 7). BT CPF E releases the resources related to the forwarding mechanism after receiving such a notification. Local request processing is performed in the following way. After the BT CPF E finds out that the request should be served locally, the BT CPF E notifies U T CPF E to release the correct T CONN IND message to upper STREAMS modules, and sends the data packet (containing the requested URL) to the original TCP module (T CPF E ). BT CPF E discards all the packets kept for this connection and frees the data structures associated with this connection. After this, BT CPF E and U T CPF E send packets upstream as quickly as possible without any extra processing overhead.

Modular TCP Handoff Design in STREAMS-Based TCP/IP Implementation

5

81

Conclusion

Research on scalable web server clusters has received much attention from both industry and academia. A routing mechanism for distributing requests to individual servers in a cluster is at the heart of any server clustering technique. Contentaware request distribution (LARD, HACC, and FLEX strategies) [4,5,1,2] has shown that policies distributing the requests based on cache affinity lead to significant performance improvements compared to the strategies taking into account only the load information. Content-aware request distribution mechanisms enable intelligent routing inside the cluster to support additional quality of service requirements for different types of content and to improve overall cluster performance. With content-aware distribution, based on TCP handoff mechanism, incoming requests must be handed off by distributor component to a back-end web server in a client-transparent way after the distributor has inspected the content of the request. The modular TCP handoff design proposed in this paper offers additional advantages: portability, flexibility, transparency, and efficiency to support scalable web server cluster design and smart request routing inside the cluster.

References 1. Mohit Aron, Darren Sanders, Peter Druschel and Willy Zwaenepoel. Scalable Content-Aware Request Distribution in Cluster-based Network Servers. In Proceedings of the USENIX 2000 Annual Technical Conference, San Diego, CA, June 2000. 2. L. Cherkasova. FLEX: Load Balancing and Management Strategy for Scalable Web Hosting Service. In Proceedings of the Fifth International Symposium on Computers and Communications (ISCC’00), Antibes, France, July 3-7, 2000, p.813. 3. A. Cohen, S. Rangarajan, and H. Slye. One the Performance of TCP Splicing for URL-Aware redirection. In Proceedings of the 2nd Usenix Symposium on Internet technologies and Systems, Boulder, CO, Oct, 1999. 4. V. Pai, M. Aron, G. Banga, M. Svendsen, P. Drushel, W. Zwaenepoel, E.Nahum: Locality-Aware Request Distribution in Cluster-Based Network Servers. In Proceedings of the 8th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS VIII), ACM SIGPLAN,1998, pp.205-216. 5. X. Zhang, M. Barrientos, J. Chen, M. Seltzer: HACC: An Architecture for ClusterBased Web Servers. In Proceeding of the 3rd USENIX Windows NT Symposium, Seattle, WA, July, 1999. 6. Data Link Provider Interface (DLPI), UNIX International, OSI Work Group. 7. Transport Provider Interface (TPI), UNIX International, OSI Work Group. 8. T. Brisco: DNS Support for Load Balancing. RFC 1794, Rutgers University, April 1995.

An Efficient TCP Flow Control and Fast Recovery Scheme for Lossy Networks H.Y. Liao, Y.C. Chen, and C.L. Lee Department of Computer Science and Information Engineering National Chiao Tung University 1001 Tahsueh Road, Hsinchu 300, Taiwan, ROC {hyliao,ycchen,leecl}@csie.nctu.edu.tw

Abstract. The initial TCP Tahoe version uses the slow-start algorithm to deal with flow control and congestion avoidance. The later Reno version deploys both fast-retransmit and fast-recovery algorithms. Traditionally a segment loss is considered as owing to the network congestion. However, a packet loss may be caused by some other reason such as a transmission error in the wireless link. Due to this reason, we design a mechanism that subdivides the congestion control mechanism into two parts, the packet loss indication and the loss recovery. Regarding the former, we no longer treat the packet loss caused by the transmission error as an indication of network congestion. While for the latter, we proposed a modified scoreboard algorithm in TCP FACK to quickly recover the packet loss and prevent the retransmitted packet from being lost again.

1

Introduction

Nowadays, TCP (Transmission Control Protocol) [12][13] has become the most popular and dominant transport layer protocol. In the evolution of TCP, there are two representative implementation versions, TCP Reno [3] and Vegas [1]. The former refers to TCP with the earlier algorithms plus Fast Recovery. The main idea of TCP Reno is to provoke packet losses when the congestion window has grown large enough to surpass the current available link bandwidth. While in Vegas, the expected throughput can be achieved by adjusting the window size based on the calculated current throughput. It does not need to adjust the window size if the current throughput lies in between two predefined thresholds. Through the approach of Vegas, it is unnecessary to generate packet loss repeatedly, because the sending rate is already kept at an appropriate level. In the latter enhanced versions of TCP Reno, including TCP New-Reno [4][5], TCP SACK [10] and TCP FACK [9], some problems for TCP Reno are solved. The above approaches of TCP implementations all assume that packet losses are due to the network congestion, and hence the overflow of buffers. However, packet loss may also be caused by unreliable transmission, such as a wireless channel or P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 82–96, 2001 © Springer-Verlag Berlin Heidelberg 2001

An Efficient TCP Flow Control and Fast Recovery Scheme for Lossy Networks

83

other lossy links. All current TCP implementation versions do not deal with the performance degradation under lossy networks. Whenever a packet loss occurs, the current TCP congestion control algorithm will reduce its congestion window to half, even if the loss is due to packet errors. This characteristic may degrade the TCP throughput. In this work, we focus on the TCP flow control and fast recovery algorithm. We design a new algorithm based on Vegas-like flow control, which is delay-based. Through the proposed flow control algorithm, we can eliminate the impact caused by the packet error. Since the lost packet should be retransmitted in time, therefore in the fast recovery phase, we deploy TCP FACK’s concept to obtain a more accurate number of outstanding packets, and give a robust scoreboard algorithm to obtain the status of retransmitted packets, so that it can solve the problem of timeout incurred by the loss of retransmitted packet. The scheme is derived from both Vegas and FACK, so we name it as Enhanced Vegas-Fack TCP, abbreviated as EVFack TCP. In Section 2, we discuss the proposed EVFack scheme. We also give examples to show the detailed behavior of EVFack, and perform both analysis and comparisons with other TCP implementation versions. In Section 3, we perform the simulation to show that our proposed scheme improves the throughput on lossy links. Section 4 concludes the work.

2 Proposed Delay-Based Congestion Control and Fast Recovery Mechanism 2.1 Delay-Based Control Among all TCP implementations, Vegas is the only one based on delay (RTT estimate) to probe the current available bandwidth. The goal of delay-based control is to maintain a stable buffer occupancy on the bottleneck link for a connection. Unlike other approaches, such as Reno, Sack and Fack, the congestion window size will be kept increasing until it overflows the bottleneck link buffer. Once the sender detects any segment loss, it will adjust the window size accordingly. The possible action is to reduce its congestion window to half. Figure 1 demonstrates the window variation of TCP Reno; this shows the window size changing to one half of the original value when a segment loss occurs. From Figure 1, we see that the window increases and then decreases to half repeatedly, especially after 5.84 seconds because of the buffer overflow. With the delay-based version such as TCP Vegas, the window size variation will not be as large as other versions. Figure 2 gives the simulation result of the congestion window variation. We focus on the steady window period, which occurs after 3.08 second. Delay-based control provides a way to control the sending rate of a connection. Through this approach, the service rate can be optimized, and congestion window adjustment algorithm can be performed based on Round-Trip-Time of segments. Because of the aforementioned advantages, our Enhanced Vegas-Fack algorithm adopts delay-based approach as the basis of flow control.

84

H.Y. Liao, Y.C. Chen, and C.L. Lee

T C P R e n o C o n g e s tio n W in d o w

T C P R eno

35 30

window size

25 20 15 10 5 0 0

0, 5

1

1, 5

2

2, 5

3

3, 5

4

4, 5

5

5, 5

6

6, 5

7

7, 5

8

8, 5

9

9, 5

10

T im e (s e c o n d s )

Fig. 1 Congestion window variations in TCP Reno.

T C P V e g a s C o n g e s tio n W in d o w

T C P V egas

35 30

window size

25 20 15 10 5 0 0

0, 5

1

1, 5

2

2, 5

3

3, 5

4

4, 5

5

5, 5

6

6, 5

7

7, 5

8

8, 5

9

9, 5

10

T im e ( s e c o n d s )

Fig. 2 Congestion window variations in TCP Vegas.

2.2

Flow Control and Congestion Control

The main purpose of our modified Delay-Based Congestion Control is to solve the throughput degradation problem under lossy network environments. Under an errorfree network, the packet loss can be an indication to network congestion. However, for lossy network environments, a segment loss may be due to the error-prone nature of links. If the traditional congestion control strategy, such as Reno is adopted, the congestion window will be reduced to half whenever detecting a segment loss. In essence, if a segment was lost due to transmission error, we believe that the congestion window size should not be reduced. The concept of estimating RoundTrip-Time variation in Vegas could be a good inspiration. The real indication of congestion should be reflected by the continuous growing of the bottleneck queue, when the queue occupancy exceeds a certain threshold for a connection, it indicates that the end-to-end path is very likely congested.

An Efficient TCP Flow Control and Fast Recovery Scheme for Lossy Networks

85

One of the difference between Vegas and our implementation is regarding the calculation for numbers of outstanding segments. We uses the term (snd.nxt – snd.fack + v_retran_data) to represent the estimated outstanding segments. We demonstrate this sequence order in Figure 2. If there is no data segment loss, snd.una equals to snd.fack. Otherwise, snd.fack is updated by the SACK option to reflect the latest data received by the receiver, and the current number of outstanding segment should be (snd.nxt - snd.fack) if there is no out-of-order segment under the assumption that segments in the interval between snd.una and snd.fack were all lost. The variables are maintained at the sender

Snd.una

Current outstanding segments

Snd.fack

Snd.nxt

Window Size Fig. 3 TCP sender space of sequence number.

In effect, this can reduce the impact of segment loss on the calculation of current sending rate. That is, if the segment loss is due to random loss or link error, the lost segment will not be considered for calculating the current sending rate. Thus by adding the RTT as the denominator of outstanding segments, the actual current rate can be estimated precisely. We compare this value with the expected achievable rate. If the difference is larger than a certain amount of buffer occupancy, it indicates that the network is congested. We believe that the variation of bottleneck queue occupancy reflects the congestion of the network. Conceptually, since we use the BaseRTT as the minimal value of ever measured RTT, and MSS is set to one segment, the queuing time plus minimal propagation delay is considered as the BaseRTT, and MSS/BaseRTT would be the rate for one unit of queue occupancy. If the expected rate minus the actual rate is larger than the variation of one unit of queue occupancy in the bottleneck link, it does indicate the network congestion, and the congestion window should be reduced by a ratio of 1/8(in slow start phase). Otherwise, cwnd can be increased with the double rate in the next RTT. In the Congestion Avoidance Phase, we follow the same decision procedure to adjust the sender’s congestion window size, except that the amount of window decreasing and increasing is linear. We maintain the queue occupancy of segments in the bottleneck between one and two. This concept is same as that in Vegas. On the other hand, the idea of estimating more precise outstanding segments comes from Fack. The flow control we proposed allows the congestion window to smoothly increase under lossy networks. Since the traditional flow control immediately reduces the congestion window to half (Reno-Based version), if the random loss happens, the traditional approach will treat this situation as congestion, thus it suffers the overall throughput. Figure 3 demonstrates the state transition diagram of our proposed flow control (abbreviated as EVFack). The fast recovery phase we modified will be introduced in the next section. The following formula are defined for this figure:

86

H.Y. Liao, Y.C. Chen, and C.L. Lee

= expected rate – actual rate = real expected rate– (snd.nxt–snd.fack+v_retran_data) / RTT. represents the MSS/BaseRTT.

Recovery with EVFack Timeou Recovery

Slow Start Timeout

Successful Recovery Recovery with EVFack

1. dup ack received actual diff < threshold 2. non dup ack received diff < threshold

Congestion Avoidanc

Fast Retransmit Fig. 4 EVFack transition diagram.

2.3 Fast Recovery TCP Fack provides an accurate estimate of current outstanding packets, thus it is able to obtain the correctly received highest sequence number through the variable snd.fack. Based on the Sack information, Fack determines which segments have been lost, and adopts its recovery algorithm. The main approach of TCP Fack is to have a “scoreboard” to maintain the information from Sack Option. The “scoreboard” proposed in [9] is basically a data structure to maintain the required information to deal with the recovery of lost segments. The scoreboard successfully stores lost segments, and provides status of each segment, including the lost ones. However, in this Fack approach, the scoreboard has some weakness in reflecting the information of retransmitted segments. If the retransmitted segment is lost, TCP Fack will force a timeout event. The behavior thereafter is to reduce TCP congestion window to one. Under this assumption, the loss probability of retransmitted segment under the lossy environment may be high. We demonstrate through the simulation in that the retransmitted packet is lost again, and this is shown in Figure 5. At 4.57 second, packet 350 was dropped, and this packet was retransmitted later. Unfortunately, this retransmitted packet is lost again at 4.68 second because of the lossy characteristic of the link. Under such circumstance, the timeout is triggered to avoid further loss. However, the timeout only prevents congestion-generated loss, it is not suitable for this case. From the observation of TCP Fack, it did suffer the throughput under lossy network. So we need another modification to the scoreboard to overcome the problem of throughput degradation. We define a so-called “rtxList”(retransmission list) as the current retransmission packet list. When a packet is retransmitted, an entry is added to rtxList. The structure of rtxList is shown in Figure 6:

An Efficient TCP Flow Control and Fast Recovery Scheme for Lossy Networks

Seq D ro p p ed S eg m en t

S e n d in g S e q u e n c e N u m b e r

400

87

350

Sequence Number

300 250 200 150 100 50 0

0

1

2

3

4

5

T im e ( S e c o n d s )

Fig. 5 TCP Fack sending sequence num with packet loss rate 0.03.

Sequence number

Sending Time

Next sequence

Success Status

Fig. 6 The structure of rtxList.

Where the “Sequence number” field stores the retransmitted sequence number, and “Sending Time” stores the time at which the retransmitted packet was sent. The “Next sequence” field maintains the expected sequence number to be sent, since in most cases the retransmitted segment will interrupt sending sequence at the source. “Success Status” indicates whether the retransmitted packet is received or not. There are two pointers, one points to the next entry, and the other points to the current reference entry, respectively, of the rtxList. The operation of “rtxList” is simple. Initially, it has no entry for any packet. We follow the Fack’s decision mechanism to detect retransmission event, then we add the retransmission entry to the rtxList. Upon receiving an Ack, the timestamp field recorded in the Ack packet will be checked if the rtxList is not empty. If the timestamp value is larger than the value in “Sending Time” field of the currently pointed entry, and the Sack option indicates that the retransmitted packet is not acknowledged, the retransmitted segment must be lost again. By now, if the awnd is less than cwnd, the lost segment, which is a retransmitted one can be retransmitted immediately. Throughout checking the “rtxList” structure, we could enhance the Fack’s scoreboard for avoiding the throughput degradation, which is caused by forced timeout when a retransmitted packet is detected as lost again.

88

H.Y. Liao, Y.C. Chen, and C.L. Lee

3 Simulation and Performance Evaluation In this section, we configure different network topologies to evaluate the performance of our proposed TCP EVFack. We implement the EVFack algorithm under the LBNL simulator “ns” [11], where we added the necessary changes to the simulator. 3.1

Simulation

Simulation 1: Throughput Improvement for the lossy networks. The first simulation uses a simple network configuration containing four nodes, as shown in Figure 7. Two of these nodes represent routers connected by a T1 link, the nominal round trip time including propagation, processing, and queuing delays between two end hosts, S1 and K1, is assumed 87ms. Thus the bandwidth*delay product is 16.3kBytes. We use an MSS (Maximum Segment Size) of 1kB in the simulation. Therefore, the required queue size in the router should be at least 17 packets. We utilize drop-tail queues to examine EVFack algorithm. The link between R2 and K1 is assumed lossy. The throughput comparisons will be made later based on environments with different loss rates.

K1

S1 1.5 Mb/s

10 Mb/s R1

R2

10 Mb/s Lossy link

Fig. 7 Lossy network configuration for

Simulation 2: The congestion effects of EVFack Algorithm. In the second simulation, we test our algorithm in a congestion-prone environment (Figure 8). There are eight end nodes in this topology, and four senders send data to their corresponding receivers, i.e. Sn to Kn (n=1 to 4), respectively. All senders and receivers are in LAN environments. The round-trip delay between senders and receivers is 167ms. Therefore, the total outstanding packet allowed in the end-to-end pipe is 31.31 KBytes. The main targets of observation are the buffer occupancy of routers and the window size variations.

3.2

Numerical Results and Performance Analysis

Simulation 1: The numerical results of the simulation are listed in the Table1. We compared the Reno, Fack, Vegas, and the proposed EVFack. Assume the node R2

An Efficient TCP Flow Control and Fast Recovery Scheme for Lossy Networks

89

between K1 is lossy, and the observed packet loss rate ranges from 0 to 0.3, which -5 means the bit error rate ranging from 0 to 2.5 * 10 . The bottleneck link is between R1 and R2, and the router buffer size is 20 packets. While the simulation time is 10 seconds.

S1 S2

K1 10 Mb/s R1

1.5 Mb/s

10 Mb/s R2

K2

S3

K3

S4

K4 Fig. 8 Simulation 2: Congestion network topology.

Under a perfect network environment (i.e. loss rate = 0), the throughput of RenoBased (Reno, NewReno and Fack) version is higher than the Delay-Based Versions (Vegas and EVFack). This is because the Delay-Based approach may need one more RTT to calculate the sending rate for adjusting its congestion window, thus window increment speed is slower than that in Reno-Based approaches. When the loss rate is getting higher, all the versions of TCP treat packet loss as an indication of congestion, and have improper action to the congestion window. In a very lossy environment, most implementations will “crash” to have poor performance. The “crash” means the congestion window size will be 1 forever, thus the allowed amount of output data won’t be inflated. Table 1 gives the comparison of Throughputs vs. Loss Rates. The performance of EVFack is higher than the all other implementations. EVFack has tolerable performance degradation with the increasing loss rate, and the congestion window size will not crash. Simulation 2: In the second simulation, we test the proposed EVFack by using a heavily congested network. There are two situations, one is that packet drop occurs only when the bottleneck buffer overflows, and the other is that the possible loss in the link is considered . We add different TCP agents to our senders (S 1 ~S 4 ), and compare the throughput of each version. We run the simulations for 50 seconds with queue size being 32 packets. Table 2 lists the simulation results with error-free network, and Table 3 demonstrates the result with packet loss rate 0.03 in the target link. The throughput index is recorded by that specific observed link. The average throughput is the average of these four connections, and this value reveals the possible fairness of that connection.

90

H.Y. Liao, Y.C. Chen, and C.L. Lee Table 1 Throughputs under TCP implementations for different packet loss rates

Packet Loss Rate

0

0.001

0.002

0.005

0.007

0.01

0.02

Reno NewReno Fack Vegas EVFack

1808 1808 1808 1749 1758

1510 1659 1709 1180 1754

1401 1536 1587 1079 1751

1295 1328 1411 783 1745

1111 1228 1305 781 1742

934 1000 1037 779 1744

645 704 751 962 1732

Packet Loss Version Rate Reno NewReno Fack Vegas EVFack

0.03

0.05

0.1

0.15

0.2

0.25

0.3

462 531 552 856 1715

381 398 422 221 1399

190 190 205 91 877

129 129 104 86 633

97 99 98 67 529

83 83 49 1 422

48 48 37 1 305

Version

In the loss free case, the throughput of EVFack is similar to other versions, it is because the window adjustment of EVFack does not consider the lost segment caused by congestion drop and thus has a slower reaction to the adjustment of window size. This may cause the window size to be over-estimated, however EVFack adopts a more accurate fast recovery method to recover the lost segments. Reno and Fack repeatedly provoke self-generated segment loss and thus suffers the throughput degradation. In a lossy network environment, EVFack has the strength to fasten the recovery of the lost retransmitted packets, and sustains an expected sending rate as well. Table 2 Congested networks with loss rate 0.

Version Throughput Average Throughput

Reno 2356 2295

Vegas 2918 2249

Fack 2424 2305.5

EVFack 2202 2295

Table 3 Congested networks with loss rate 0.03.

Version Throughput Average Throughput

Reno 546 2284.5

Vegas 1148 2249.25

Fack 548 2299

EVFack 1247 2287

An Efficient TCP Flow Control and Fast Recovery Scheme for Lossy Networks

91

T C P C o n g e s tio n W in d o w V a ria tio n s ( R e n o a n d F a c k ) 40 35

Window Size

30 Fack R eno

25 20 15 10 5 0 0

5

10

15

20

25

30

35

40

45

50

T im e (S e c o n d s)

Fig. 9 Window size variations under loss rate 0 (Reno and Fack). Figure 9 to Figure 12 show window variations and queue occupancy under loss free condition, and figure 13 to Figure 16 illustrate the conditions under loss rate 0.03. Figure 9 demonstrates the Reno and Fack window variations. Figure 10 shows these observations regarding Vegas and EVFack. In Figure 10, the window size variations of the EVFack may be over-estimated, but at the end of the sending period, it adjusts their window size to a stable value as detected. However, EVFack may inflate its window size, because the calculating formula for sending rate is different from that in Vegas. This behavior does not suffer throughput degradation because a fast and accurate recover method is invoked. Other versions of TCP are more conservative, and their window size cannot be increased, even the network has the capacity to TCP Congestion Window Variations 25

Window Size

20

15 EVFack Vegas 10

5

0 0

5

10

15

20

25

30

35

40

45

50

Time (Seconds)

Fig. 10 Window size variations under loss rate 0 (EVFack and Vegas).

92

H.Y. Liao, Y.C. Chen, and C.L. Lee

accommodate the traffic. Figure 12 shows that the EVFack has the highest bottleneck link utilization among all versions of TCP because it keeps a desirable level of link utilization. Vegas also maintains stable queue occupancy, however, its level is smaller because of the slow increasing window size for each connection, but eventually it may be as large as desired. Reno and Fack possess the natural behavior to inject too many segments to overflow the buffer size, and it leads to the loss of segments. Q ueue O ccupancy of B ottleneck L ink 35 30

Buffer Size

25 20 Fack R eno

15 10 5 0 0

5

10

15

20

25

30

35

40

45

50

Ti me ( Sec ond s)

Fig. 11 Queue occupancy of bottleneck link (Loss Rate 0) : Reno and Fack. Queue Occupancy of Bottleneck Link 35 30

Buffer Size

25 20

Vegas EVFack

15 10 5 0 0

5

10

15

20

25

30

35

40

45

50

Time (Seconds)

Fig. 12 Queue occupancy of bottleneck link (Loss free): Vegas and EVFack.

An Efficient TCP Flow Control and Fast Recovery Scheme for Lossy Networks

93

TCP Congstion Window Variations (Reno and Fack) 12

10

Window Size

8 Fack Reno

6

4

2

0 0

5

10

15

20

25

30

35

40

45

50

Time (Seconds)

Fig. 13 Window size variations under loss rate 0.03 (Reno and Fack). From Figure 13 to 14, the packet loss rate 0.03 is used. Both Reno and Fack feature the drastic window variations, because they may mistake random loss packet as network congestion more frequently. Besides, the queue occupancy of Reno-Based TCP switches between empty and full alternatively, thus has poor network utilization. In Figure 15 and Figure 16, EVFack has better control for the lossy networks. It sustains a higher stable queue occupancy than Vegas. Even in the lossy environments, the congestion window size in EVFack still can be maintained at an expected level, and thus achieve a full buffer utilization, as shown in Figure 16. The aforementioned two simulations demonstrate that EVFack performs much better under the lossy networks compared with other TCP versions.

4 Conclusion and Future Works In this work, we present the EVFack algorithm which improves the TCP performance under lossy network environments. EVFack integrates the delay-based flow-control (like Vegas) and Fack’s recovery method to determine the process of recovery to proceed. In our investigation, the delay-based control uses the RTT to get congestion indication, and based on that it can maintain a possible achievable window size. It takes benefits of avoiding unnecessary inflation of the congestion window. We modified the flow control which does not count the lost packets caused by random loss, and let the window size be kept as stable as possible. In the fast recovery phase, EVFack uses a “retransmission list” to record the current outstanding retransmitted packets. Thus, it successfully fast-recovers the lost retransmitted packets, and improves the performance under error-prone networks.

94

H.Y. Liao, Y.C. Chen, and C.L. Lee

Q u eu e O ccu p an cy o f B o ttlen eck L in k 35 30

Buffer Size

25 20

F ack R en o

15 10 5 0 0

5

10

15

20

25

30

35

40

45

50

T im e (S eco n d s)

Fig. 14 Queue occupancy of bottleneck link (Loss Rate 0.03): Reno and Fack. TCP Congestion Window Variations 25

Window Size

20

15 EVFack Vegas 10

5

0 0

5

10

15

20

25

30

35

40

45

50

Time (Seconds)

Fig. 15 Window size variations under loss rate 0.03 (Vegas and EVFack). The simulation results demonstrate the performance improvement over the lossy links; however, it is difficult to develop a realistic Internet simulation model to observe the real lossy characteristics. We only use the simplified test environments to model our proposed implementations, so that we can reveal the phenomena of our proposed algorithm. A more appropriate simulation paradigm for lossy environment is still under investigation for the future works.

An Efficient TCP Flow Control and Fast Recovery Scheme for Lossy Networks

95

Queue Occuancy of Bottleneck Link 30

25

Buffer Size

20 Vegas

15

EVFack

10

5

0 0

5

10

15

20

25

30

35

40

45

50

Tim e (seconds)

Fig. 16 Queue occupancy of bottleneck link (loss rate 0.03)

References [1] L. Brakmo, S. O’Malley, and L. Peterson, “TCP Vegas: End-to-End Congestion Control in a Global Internet.” IEEE Journal on Selected Areas in Communications (JSAC), 13(8):1465-1480, October 1995. [2] K. Fall and S. Floyd. “Simulation-based comparisons of Tahoe, Reno, and SACK TCP.” ACM Computer Communication Review, 26(3):5-21, July 1996. [3] S. Floyd. “TCP and Successive Fast Retransmission”, February 1995. ftp://ftp.ee.lbl.gov/papers/fastretrans.ps [4] J. Hoe. “Start-up Dynamics of TCP’s Congestion Control and Avoidance Schemes,” Master’s Thesis, MIT. June 1995 [5] J.Hoe. “Improving the Start-up Behavior of a Congestion Control Scheme for TCP,”. SIGCOMM Symposium on Communications Architectures and Protocols, August 1996. [6] V. Jacobson. Jacobson, “Congestion Avoidance and Control,” in Proc. SIGCOMM’88 Symp., August 1988, pp.314-329. [7] R. Jain, “ A delay-based approach for congestion avoidance in interconnected heterogeneous computer networks,” ACM Computer Communication Review, vol. 19 no. 5, pp.56-71, Oct. 1989. [8] Phil Karn and Craig Partridge. Improving Round-Trip Time Estimates in Reliable Transport Protocols. ACM SIGCOMM, pages 2-7, August 1987. [9] M. Mathis and J. Mahdavi. “Forward Acknowledgement (FACK): Refining TCP Congestion control.” Proceedings of ACM SIGCOMM’96, pages 281291, August 1996. [10] M. Mathis and J. Mahdavi, S. Floyd, and A. Romanow. TCP selective acknowledgement option. Internet Draft, work in progress, May 1996.

96

[11] [12] [13] [14]

H.Y. Liao, Y.C. Chen, and C.L. Lee

S. McCanne and S. Floyd. UCB/LBNL/VINT Network Simulator - ns(version 2) network simulator, http://www-mash.cs.berkerley.edu/ns/ W. Stevens, TCP/IP Illustrated, Volume 1. Addison-Wesley, 1994. W. Stallings, High-Speed Networks, TCP/IP and ATM Design Principles. Prentice-Hall, 1998. Gary R. Wright and W. Richard Stevens. TCP/IP Illustrated, Volume II: The Implementation. Addison-Wesley, 1995.

Bandwidth Tradeoff between TCP and Link-Level FEC Chadi Barakat and Eitan Altman INRIA, 2004 route des Lucioles, 06902 Sophia Antipolis, France Email : {cbarakat,altman}@sophia.inria.fr

Abstract. FEC is widely used to improve the quality of noisy transmission media as wireless links. This improvement is of importance for a transport protocol as TCP which uses the loss of packets as an indication of network congestion. FEC shields TCP from losses not caused by congestion but it consumes some bandwidth that could be used by TCP. We study in this paper the tradeoff between the bandwidth consumed by FEC and that gained by TCP.

1

Introduction

Forward Error Correction (FEC) is widely used to improve the quality of noisy transmission media as wireless links [2,4]. This improvement is of importance for a transport protocol as TCP [8,16] which uses the loss of packets as an indication of network congestion. A TCP packet corrupted while crossing a noisy link is discarded before reaching the receiver which results in an unnecessary window reduction at the TCP source, and hence in a deterioration of the performance of the TCP transfer [2]. In the following, we will only focus on transmission errors on wireless links and we will call the corrupted packets non-congestion losses or link-level losses since they appear at a level below IP. The idea behind FEC is to transmit on the wireless link, together with the original data, some redundant information so that a corrupted packet can be reconstructed at the output of the link without the need for any retransmission from TCP [2,4]. Normally, this should improve the performance of TCP since it shields it from non-congestion losses. But, FEC consumes some bandwidth. Using much FEC may steal some of the bandwidth used by TCP which deteriorates the performance instead of improving it. Clearly, a tradeoff exists between the bandwidth consumed by FEC and that gained by TCP. We analyze this tradeoff in this paper. The question that we asked is, given a certain wireless link with certain characteristics (bandwidth, error rate, burstiness of errors), how to choose the amount of FEC so that to get the maximum gain in TCP performance. A mathematical model and a set of simulations are used for this purpose.



A detailed version of this paper can be obtained upon request from the authors.

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 97–107, 2001. c Springer-Verlag Berlin Heidelberg 2001 

98

C. Barakat and E. Altman 1-q 1-p

1111 0000 0000 1111 0000 1111 0000 1111 1 0000 1111 0000 1111 0000 1111

0

q

p

Fig. 1. The Gilbert loss model

2

Model for Non-congestion Losses

Consider a long-life TCP connection that crosses a network including a noisy wireless link of rate µ. We suppose that the quality of the noisy link is improved by a certain FEC mechanism that we will model in the next section. Most of the works on TCP performance [10,11,13] make the assumption that the loss process of TCP packets is not correlated. Packets are assumed to be lost independently with the same probability P . This does not work for wireless links where transmission errors tend to appear in bursts [3,4,5,9]. The model often used in the literature to analyze correlated losses on a wireless link is the one introduced by Gilbert [3,4,7,9]. It is a simple ON/OFF model. The noisy link is supposed to be in one of two states: 0 for Good and 1 for Bad. A packet is lost if it leaves the link while it is in the Bad state, otherwise it is supposed to be correctly received. We use such a model in our work. A discrete-time Markov chain (Fig. 1) with two states (Good and Bad) models the dynamics of the wireless link. We focus on the loss process of link-level packets also called transmission units. We suppose that a TCP packet is transmitted over the wireless link using multiple small transmission units [3,4]. A transmission unit can be a bit, a byte, an ATM cell, or any other kind of link-level blocks used for the transmission of TCP/IP packets. The state of the wireless link is observed upon the arrivals of transmission units at its output. We suppose that units cross continuously the link. If no real units exist, fictive units are inserted. Let p denote the probability that the wireless link passes from Good state to Bad state when a transmission unit arrives at its output. Let q denote the probability that the link stays in the Bad state. q represents how much the loss process of transmission units is bursty. The stationary probabilities of the Markov chain associated to the wireless link are equal to: πB = p/(1 − q + p) and πG = (1 − q)/(1 − q + p). Denote by LB and LG the average lengths of Bad and Good periods in terms of transmission units. A simple calculation shows that, LB = 1/(1 − q),

LG = 1/p.

(1)

The average loss rate, denoted by L, is equal to L = LB /(LB + LG ) = p/(1 − q + p) = πB .

3

(2)

Model for FEC

The most common code used for error correction is the block code [14,15]. Suppose that data is transmitted in units as in our model for the noisy link. Block

Bandwidth Tradeoff between TCP and Link-Level FEC

99

FEC consists in grouping the units in blocks of K units each. A codec then adds to every block a group of R redundant units calculated from the K original units. The result is the transmission of blocks of total size N = K + R units. At the receiver, the original K units of a block are reconstructed if at least K of the total N units it carries are correctly received. This improves the quality of the transmission since a block can now resist to R losses without being discarded. In our work, we consider a block FEC implemented on the wireless link in the layer of transmission units. We ignore any FEC that may exist below this layer (e.g., in the physical layer). The input to our study is the loss process of transmission units which is assumed to follow the Gilbert model. In what follows, we will show how much the parameters of the FEC scheme (N, K) impact the performance of TCP transfers.

4

Approximation of TCP Throughput

Consider the throughput as the performance measure that indicates how well TCP behaves over the wireless link. Different models exist in the literature for TCP throughput [1,10,11,13]. Without loss of generality, we consider the following  simple expression for  TCP throughput in terms of packets/s: X = (1/RT T ) 3T /2 = (1/RT T ) 3/(2P ) [11]. This expression is often called the square root formula. T = 1/P denotes the average number of TCP packets correctly received between packet losses. P denotes the probability that a TCP packet is lost in the network. In case of bursty losses, P represents the probability that a TCP packet is the first loss in a burst of packet losses [13]. This is because the new versions of TCP (e.g., SACK [6]) are designed in a way to divide their windows one time by two for a burst of packet losses. RT T is the average round-trip time seen by the connection. Note that it is also possible to use in our analysis other more sophisticated expressions for TCP throughput (e.g., [1]). Suppose that the wireless link is the bottleneck on the path of the connection. Thus, in the absence of TCP is upper bounded by µ.  of FEC,the throughput  We write X = min (1/RT T ) 3T /2, µ . Our objective is to express the throughput of TCP as a function of the parameters of the loss process of transmission units (p, q) and the parameters of the FEC scheme (N, K). We already have the expression of the throughput as a function of what happens at the packet level (P ). What we still need to do is to relate the loss process of TCP packets to the loss process of transmission units. To simplify the analysis, we consider the best case when packets are only lost on the wireless interface whenever the wireless bandwidth µ is not fully utilize (possible since the wireless link is assumed to be the bottleneck). In the case when transmission units are lost independently of each other (p = q), P = 1/T is simply equal to the probability that a TCP packet is lost while crossing the wireless link. This case is studied in the next section. In the case when transmission units are lost in bursts, T must be calculated as the average number of TCP packets correctly transmitted between bursts of packet losses.

100

C. Barakat and E. Altman

3000

3000

K = 30 K = 20 K = 10

2000

1500

1000

2000

1500

1000

500

500

0

K = 30 K = 20 K = 10

2500 Average TCP Throughput (Units/s)

Average TCP Throughput (Units/s)

2500

1

1.05

1.1

1.15

1.2 1.25 1.3 Amount of FEC N/K

1.35

1.4

1.45

Fig. 2. Model: X vs. N/K and K

1.5

0

1

1.05

1.1

1.15

1.2 1.25 1.3 The Amount of FEC N/K

1.35

1.4

1.45

1.5

Fig. 3. Simulation: X vs. N/K and K

This is done in Section 6 where we study the impact of the correlation of unit losses on the performance of TCP. Now, even though it increases T , the addition of FEC consumes some bandwidth and decreases the maximum throughput the TCP connection can achieve. Instead of µ, we get Kµ/N as a maximum TCP throughput. If we denote by S the size of a TCP packet in terms of transmission units, the throughput of TCP in presence of a FEC scheme (N, K) and in terms of units/s can be written as,    XN,K = min (S/RT T ) 3TN,K /2, Kµ/N . (3)

5

The Case of Non-correlated Losses

Consider the case when transmission units are lost independently of each other with probability p (p = q). Thus, TCP packets are also lost independently of each other but with probability PN,K = 1/TN,K which is a function of the amount of FEC (N, K). The throughput of TCP can be approximated by using (3). 5.1

The Analysis

Suppose that TCP packets are of the size of one link-level block (S = K units). Given a certain block size (K) and a certain amount of FEC (N, K), the choice of the size of the TCP packet in terms of blocks is another problem that we will not address in this paper. A TCP packet is then lost when more than R of its units are lost  due to transmission errors. This happens with probability K−1 PN,K = i=0 Ni (1 − p)i pN −i . It is clear that the addition of FEC at the link level reduces the loss probability of TCP packets. This addition improves the throughout whenever the first term of the minimum function in (3) is smaller than the second term. When these two terms are equal, the quantity of FEC added to the wireless link is sufficient to eliminate the negative effect of non-congestion losses on TCP. We say here that FEC has cleaned the link from TCP point of view. Any increase in FEC

Bandwidth Tradeoff between TCP and Link-Level FEC 70000

18

K = 30 K = 20 K = 10

p = 0.001 p = 0.01 p = 0.05 p = 0.1

16

60000

101

12 Bandwidth Gain G

Available Bandwidth (Units/s)

14 50000

40000

30000

10 8 6

20000 4 10000

0 0.98

2

1

1.02

1.04

1.06 1.08 1.1 1.12 The Amount of FEC N/K

1.14

1.16

1.18

Fig. 4. Model: Optimal FEC vs. µ

1.2

0 1.05

1.1

1.15

1.2

1.25 1.3 The Amount of FEC N/K

1.35

1.4

1.45

1.5

Fig. 5. Model: G vs. N/K and p

beyond this point results in a throughput deterioration. There will be more FEC than what is needed to clean the link. Given µ, K, and p, the optimal quantity of FEC from TCP point of view is the solution of the following equation,  (N/(KRT T )) 3/(2PN,K ) = µ. (4) 5.2

Analytical Results

We show in Figure 2 how the throughput of TCP varies as a function of the ratio N/K (FEC rate) for different values of K (10, 20, and 30 units). RTT is taken equal to 560 ms and the wireless link bandwidth µ to 3000 units/s. We can see this scenario as the case of a mobile user downloading data from the Internet through a satellite link. This value of µ is approximately equal to the maximum ATM cell rate on a T1 link (1.5 Mbps). p is set to 0.01. It is clear that the performance improves considerably when FEC is added and this improvement continues until the optimum point given by (4) is reached. Beyond this point, any increase in FEC deteriorates the throughput. Also, we notice that for a certain quantity of FEC, an increase in K improves the performance. An increase in K results in a faster window growth. TCP window is increased in terms of packets rather than bytes [16]. The TCP source then returns faster to its rate prior to the detection of a non-congestion loss. In Figure 4, we plot the left-hand term of (4) as a function of N/K for the same three values of K. These curves provide us with the optimal amount of FEC for given µ, p, and K. We see well how the increase in K reduces considerably the amount of FEC needed to clean the wireless link from TCP point of view. Given µ, a compromise between K and FEC rate must be done. First, we choose the largest possible K, then we choose the appropriate amount of FEC. For µ = 3000 units/s and K = 20, we show in Figure 6 how the throughput of TCP varies as a function of p for different values of N . It is clear that adding just one redundant unit to every FEC block results in a considerable gain in performance especially at small p. Adding more redundancy at small p deteriorates slightly the performance since the link is already clean and the additional redundancy steals some of the bandwidth used by TCP. This is not

102

C. Barakat and E. Altman

the case at high p where much redundancy needs to be used in order to get good performance. Note that even though an excess of FEC reduces the performance of TCP when losses are rare, the reduction is negligible in front of the gain in performance we obtain when losses become frequent. When the link is heavily lossy (log(p) > −1.7), the three amounts of FEC plotted in the figure become insufficient and all the curves converge to the same point. 5.3

Simulation Results

Using the ns simulator [12], we simulate a simple scenario where a TCP source is connected to a router via a high speed terrestrial link and where the router is connected to the TCP receiver via a noisy wireless link. The Reno version of TCP [6] is used. The TCP source is fed by an FTP application with an infinite amount of data to send. We add our FEC model to the simulator. The transmission units on the wireless link are supposed to be ATM cells of size 53 bytes. We choose the bandwidth of the wireless link in a way to get a µ equal to 3000 cells/s. RTT is taken equal to 560 ms and the buffer size in the middle router is set to 100 packets. This guarantees that no losses occur in the middle router before the full utilization of µ. Figures 3 and 7 show the variation of the simulated throughput as a function of the amount of FEC (N/K) and the unit loss probability p respectively. In the first figure, p is set to 0.01. We clearly notice the good match between these results and the analytical ones. The small difference is due to the fact that the expression of the throughput we used does not consider the possibility of a timeout when multiple packet losses appear in the same TCP window [6]. Also, in our analysis, we considered that RTT is always constant which does not hold when the throughput of TCP approaches the available bandwidth. 5.4

The Tradeoff between TCP Throughput and FEC Cost

We compare in this section the bandwidth gained by TCP to that consumed by FEC. Let G be the ratio of these two bandwidths, G = (XN,K −XK,K )/(XN,K (N −K)/K) = (1−XK,K /XN,K )×(K/(N −K)). (5) This ratio indicates how much beneficial is the addition of FEC. It can be seen as a measure of the overall performance of the system TCP-FEC. A value close to one of G means that we pay for FEC as much as we gain in TCP throughput. A negative value means that the addition of FEC has reduced the performance of TCP instead of improving it. In Figure 5 we plot G as a function of the amount of FEC for different unit loss probabilities. Again, we take µ = 3000 units/s and K = 20. This figure shows that the gain in overall performance is important when the loss probability and the amount of FEC are small. Moreover, with small amounts of FEC, the gain decreases considerably when the loss rate (L = p) increases. Now, when the FEC rate increases, the curves converge approximately to the same point with a slightly better gain this time for higher loss probabilities.

Bandwidth Tradeoff between TCP and Link-Level FEC 3000

3000

K=20 , N=21 K=20 , N=22 K=20 , N=23 K=20 , N=20

2000

1500

1000

-4

-3.5

-3

-2.5 -2 -1.5 Log10 of the Unit Loss Probability p

-1

-0.5

Fig. 6. Model: X vs. p and N/K

5.5

2000

1500

1000

500

500

0

K=20 , N=21 K=20 , N=22 K=20 , N=23 K=20 , N=20

2500 Average TCP Throughput (Units/s)

Average TCP Throughput (Units/s)

2500

103

0

0

-4

-3.5

-3

-2.5 -2 -1.5 Log10 of the Unit Loss Probability p

-1

-0.5

0

Fig. 7. Simulation: X vs. p and N/K

Number of Connections and the Gain in Performance

We notice in Figure 5 that using a small amount of FEC gives the best gain in overall performance. Thus, in order to maintain a high gain, one can use a small amount of FEC and fully utilize the available bandwidth on the wireless link by opening multiple TCP connections. But, in practice we cannot always guarantee that there are enough TCP connections to fully utilize the available bandwidth. A TCP connection must be able to use alone all the available bandwidth. For this reason, FEC has to be added in large amounts so that to make the noisy link clean from the point of view of a single TCP connection even if the achieved gain is not very important.

6

The Case of Correlated Losses

In this section we study the influence of burstiness of transmission unit losses on the efficiency of a FEC scheme. It is clear that when unit losses tend to appear in bursts, more FEC is needed to clean the link. Packets are hurt by bursts of losses and they require a large number of redundant units per packet (R) to be corrected. But, for the same average loss rate (L), the burstiness of losses reduces the probability that the link passes to the Bad state (p decreases when q increases). This reduces the probability that a TCP packet is hurt by a burst of losses. TCP throughput may then improve and the amount of FEC could be reduced. An analysis is needed to understand these opposite effects of burstiness. 6.1

Performance Analysis

Let us calculate T , and hence the throughput of TCP using (3), as a function of the amount of FEC, K, the average loss rate, the burstiness of losses, and µ. Recall that T in this case denotes the average number of TCP packets correctly transmitted between bursts of packet losses. Let t be the number of good TCP packets between two separate bursts. The minimum value of t is one packet and its expectation is equal to T . Let Yn be the state of packet n. 0 is the number of the first good TCP packet between the

104

C. Barakat and E. Altman

two bursts. Yn takes two values B (Bad) and G (Good). We have Y0 = G. T can ∞ ∞ be written as n=0 P (t > n|Y0 = G) = 1 + n=1 P (t > n|Y0 = G). The computation of T is quite complicated since the TCP packets are not always transmitted back-to-back. Another complication is that {Yn } does not form a Markov chain. Indeed, if we know for example that a packet, say n, is of type B then the probability that packet n + 1 is of type G also depends on the type of packet n − 1. If packet n − 1 were G rather than B, then the last units of packet n are more likely to be those that caused its loss. Hence, the probability that packet n + 1 is B is larger in this case. This motivates us to introduce another random variable which will make the system more “Markovian” and will permit us to write recurrent equations in order to solve for T . We propose to use the state of the last transmission unit received, or fictively received, before the nth TCP packet. The knowledge of the state of this unit, denoted by Yn−1 (which may again take the values B and G), fully determines the distribution of the state Yn of the following TCP packet. We write T as 1 + αP (Y1−1 = G|Y0 = ∞ −1 G) + βP (Y1 = B|Y0 = G), where α = n=1 P (t > n|Y0 = G, Y1−1 = G) and ∞ −1 β = n=1 P (t > n|Y0 = G, Y1 = B). We shall make the following assumption, Assumption 1: P (Y1−1 = G|Y0 = G) ≈ πG and P (Y1−1 = B|Y0 = G) ≈ πB . Assumption 1 holds when the time to reach steady state for the Markov chain in the Gilbert model is shorter than the time between the beginning of two consecutive TCP packets (either because the TCP packets are sufficiently large or because they are sufficiently spaced). Assumption 1 also holds when πB and the loss probability of a whole TCP packet are small. Indeed, we can write, πG = P (Y1−1 = G|Y0 = G)P (Y0 = G) + P (Y1−1 = G|Y0 = B)P (Y0 = B) ≈ P (Y1−1 = G|Y0 = G) · 1 + P (Y1−1 = G|Y0 = B) · 0. In view of Assumption 1, the probability that the unit preceding a TCP packet is lost can be considered as independent of the state of the previous packet. It follows that T = 1 + απG + βπB , with α = (1 − P (Y1 = B|Y1−1 = G))(1 + απG + βπB ), β = (1 − P (Y1 = B|Y1−1 = B))(1 + απG + βπB ). This yields, 1/T = πG P (Y1 = B|Y1−1 = G) + πB P (Y1 = B|Y1−1 = B). The calculation of T is then simplified to the calculation of the probability that a TCP packet is lost given the state of the unit just preceding it. Again, it is difficult to find an explicit expression for this probability. A TCP packet can be lost by a single long burst of unit losses as well as by multiple separate small bursts. To further facilitate the analysis, we assume that bursts of losses at the unit level are separated so that two bursts rarely appear within the same packet. This holds if, Assumption 2: (1 − q) · L · N D1. In the event that the unicast query path is invalidated as a result of node movements, a new query will be sent either through a different unicast query path (if available) or via a broadcast.

3

Performance Evaluation

3.2

Simulation Environment

We use a detailed simulation model based on ns2 [5] with CMU wireless extensions [6] to evaluate the performance of DSR and DS-DSR. As DS-DSR is developed based on the ns implementation of DSR, we use identical traffic and mobility scenarios of previous reported results for DSR [7] to ensure fairness of comparison. A total of 50 nodes, moving over a 1500m x 300m rectangular flat space are simulated for 900s at a speed up to 20m/s. Each simulation run is modeled with 20 CBR (constant bit rate) connections, which are originated from 14 different sources. Data is sent in 64-bytes packets at 4 packets per second. The movement scenarios were generated based on random waypoint model [2], which are characterized by a pause time. 7 pause times were used in this simulation: 0s, 30s, 60s, 120s, 300s, 600s and 900s. A pause time of 0s corresponds to continuous motion, and a pause time of 900s (length of simulation) corresponds to no motion. We simulate each pause time with 10 different movement scenarios, and present the mean of each metric over these ten runs. 3.2

Simulation Results

We evaluate DSR and DS-DSR using 4 metrics: (i) Routing overhead – The total number of routing packets sent which includes the Route Request (RREQ), Route Reply (RREP), and Route Error (RERR) packets. Each hop-wise transmission is counted as one transmission. (ii) Route discovery latency – The amount of time needed to acquire a route to the destination. This metric measures the delay between the transmission of a RREQ and obtainment of the first RREP that answers the request. (iii) Path optimality – The difference in number of hops between the route a data packet took to reach its destination and the shortest route that physically existed at the time of transmission. (iv) Packet delivery ratio – The ratio of the number of data packets successfully delivered to their destinations to those generated by the CBR sources.

Unicast Query Mechanism for Dynamic Source Routing in Mobile ad Hoc Networks

3.2.1

171

Routing Overhead

In Fig. 3, we observed that the total number of routing packets generated by DS-DSR is consistently lower than DSR for all simulated pause times. More than 25% of the routing overhead is reduced at pause time zero when nodes were in constant motion (highest node mobility). Some 75% of the routes were discovered using unicast query, which results in fewer transmissions of RREQ and associated RREP. The margin of reduction, however, diminishes as the pause time increases. At 900s when nodes were stationary, the routing overheads incurred by both protocols were nearly comparable. This diminishment of overhead reduction with pause time is expected because when nodes were less mobile, the routes established were correspondingly more stable, and hence a lesser need for route discovery. Next, we examine how each constituent of the routing overhead (RREQ, RREP and RERR) in DS-DSR performs relative to DSR. Route Requests Fig. 4 shows the number of RREQ originated and forwarded for different pause times. Note that we use the term ‘originated’ to mean a packet that is created and transmitted by its originator, and ‘forwarded’ to mean a packet that is transmitted by a node other than its originator. DS-DSR achieves a 30% reduction in number of RREQ forwarded at pause time zero, above which the margin again diminishes due to a declining need for route discovery. One interesting observation is the increase in number of RREQ originated by DS-DSR. By minimizing the use of broadcast, the number of routes that a node can possibly learned is reduced. Thus, when a route is invalidated as a result of node movements, a greater tendency exists for the node to obtain a replacement route by initiating a route discovery, giving rise to the higher number of RREQ originated.

Fig. 3. Total routing overhead of DSR and DS-DSR

172

B.-C. Seet, B.-S. Lee, and C.-T. Lau

Route Replies As one expects, the number of RREP originated by DS-DSR is substantially reduced as a result of fewer RREQ transmitted (Fig. 5). We also noted with interest number of RREP forwarded by DS-DSR, which seems relatively unaffected by the unicast query mechanism contrary to our intuition. This indicates an increase in average number of hops traversed by RREP, the reason being twofold: First, the routes discovered by unicast query might not be always the most optimal. Thus, the number of hops that RREP took to return to the source could be higher. Second, the number of routes learned by each node in DS-DSR is fewer relative to DSR. Hence to acquire a route, a RREQ needs propagate further from the source and answer by RREP either from the target or from its neighboring nodes. The proximity of these nodes to the target enables them to better learn of a route to the target even when there is no direct end-to-end traffic between them. For instance, by promiscuous learning (overhearing) when both nodes and target are within wireless range of each other, and as an intermediate node that relays traffic to and from the target.

RREQ forwarded

RREQ originated

Fig. 4. Route Requests (RREQ) of DSR and DS-DSR

Route Errors From Fig. 6, we found that DS-DSR has fewer RERR transmitted due to a fresher set of routes used for packet transmissions. The DS-DSR’s characteristics of performing frequent but low-cost route discovery, and obtaining fresher routes from nodes closer to the destination (particularly when nodes were operating in promiscuous mode) are reasons that results in fewer transmission errors.

Unicast Query Mechanism for Dynamic Source Routing in Mobile ad Hoc Networks

173

RREP originated

RREP forwarded

Fig. 5. Route Replies (RREP) of DSR and DS-DSR

3.2.2

Route Discovery Latency

Table 1 summarizes the latency incurred by a route discovery initiator to receive its first RREP in response to RREQ at pause time zero. We found that DS-DSR incurred a mean latency of 25.6ms, increased by nearly a factor of two over that incurred by DSR. This increased in latency is in general due to the greater number of hops over which RREQ must traverse to obtain a route. Table 1. Latency of first RREP for DSR and DS-DSR

DS-DSR DSR

Max Latency 850.4ms 956.1ms

Min Latency 1.7ms 1.3ms

Mean Latency 25.6ms 14.8ms

Another contributing factor is the delay introduced when an initial attempt to acquire a route through unicast query is unsuccessful and a broadcast is performed. We found that this occurs in approximately 18% of the total unicast queries. Other factors such as network congestion plays a less dominating role in influencing latency in DS-DSR due to the fewer routing packets being transmitted. This is evidenced from the fewer occurrences of a full network interface queue that we observed in most scenarios.

174

B.-C. Seet, B.-S. Lee, and C.-T. Lau

RERR forwarded

RERR originated

Fig. 6. Route Errors (RERR) of DSR and DS-DSR

3.2.3

Path Optimality

Fig. 7 depicts the difference between the actual number of hops taken by a data packet and the number of hops that are actually required. A difference of 0 means the packets took an optimal (shortest) route, and a difference greater than 0 reflects the additional hops taken by the packets. The statistics obtained shows that more than 80% of the packets in DS-DSR are routed through optimal paths. We also noted that 91% of the packets that did not take the most optimal paths traveled just one additional hop. If we let n be the number of additional hops incurred, Jn and Kn be the number of packets incurring n hops in DS-DSR and DSR respectively, then the average additional hops incurred per data packet can be found using Eq. (1).

∑ { ∞

n =0

J n − Kn ∗ n ∞

∑ n =0

}

(1)

Jn

By considering packets that fall in the range 0 ≤ n ≤ 3 (we neglect those for n > 3 as their numbers are comparatively insignificant), we found that DS-DSR incurred on average 0.03 additional hops per data packet.

Unicast Query Mechanism for Dynamic Source Routing in Mobile ad Hoc Networks

175

Fig. 7. Path optimality of DSR and DS-DSR

3.2.4

Packet Delivery Ratio

Fig. 8 shows that packet delivery rate for DSR and DS-DSR ranges from 96 to 100% with the latter having a slightly reduced rate of 1% at pause time zero, despite the fact it incurred fewer route transmission errors. This is due to the way packets in error are being handled in DSR. A node only salvages a packet if an alternate route exists in its route cache, otherwise the packet is dropped. Since the number of routes learned per destination per node is relatively fewer in DS-DSR, the proportion of packets in error not salvaged is envisaged to be higher.

4

Conclusion

In this paper, we investigate the performance of DS-DSR, a modified version of DSR optimized with a better, efficient route discovery mechanism based on the concept of unicast query. The major drawback that limits the current effectiveness of DSR is the high overhead it entails due to an explicit dependence on flooding for route discovery. The new approach emphasizes on minimizing the use of broadcast as opposed to past focus on constraining the search space of broadcast. Much unique to DS-DSR is the characteristic of performing frequent but low cost route discovery, thus potentially capable of obtaining fresher routes with a lower routing overhead. However, we also noted that broadcast is necessary for an effective distribution of routing information, which otherwise a node might take more time to obtain a route to its destination – a classic tradeoff between bandwidth and latency.

176

B.-C. Seet, B.-S. Lee, and C.-T. Lau

Fig. 8. Packet delivery ratio of DSR and DS-DSR

References 1. 2. 3. 4. 5. 6. 7.

8.

Broch, J., Johnson, D.B., Maltz, D.A.: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. Internet draft, draft-ietf-manet-dsr-03-txt. (1999) Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, edited by Imielinksi, T., Korth, H., Chpt. 5, Kluwer Academic Publishers (1996) 153-191 Dommety, G., Jain, R.: Potential Networking Applications of Global Positioning Systems (GPS). Technical report, TR-24 (1996). Computer Science Department, Ohio State University. Ko, Y., Vaidya, N.: Location Aided Routing (LAR) in Mobile Ad Hoc Networks. Proc. Fourth ACM/IEEE Int. Conference on Mobile Computing and Networking (1998) 66-75 Fall, K., Varadhan, K.: ns notes and documentation. The VINT Project, UC Berkeley. URL: http://www-mash.cs.berkeley.edu/ns/ The CMU Monarch Project’s Wireless and Mobility Extensions to ns. URL: http://www.monarch.cs.cmu.edu/ Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y., Jetcheya, J.: A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Proc. Fourth ACM/IEEE Int. Conference on Mobile Computing and Networking (1998) 85-97 Mobile Ad-hoc Networks (MANET) working group charter, Internet Engineering Task Force (IETF). URL: http://www.ietf.org/html.charters/manet-charter.html

Ad-hoc Filesystem: A Novel Network Filesystem for Ad-hoc Wireless Networks Kinuko Yasuda1 and Tatsuya Hagino2 1 Graduate School of Media and Governance, Keio University, Endo 5322, Fujisawa, Kanagawa, 252–8520, Japan, [email protected] 2 Faculty of Environmental Information, Keio University, Endo 5322, Fujisawa, Kanagawa, 252–8520, Japan, [email protected]

Abstract. In this paper, we propose a new filesystem named Ad-hoc Filesystem which targets ad-hoc wireless networks. Ad-hoc Filesystem is a serverless filesystem which automatically generates temporary shared space among multiple mobile machines when they gather in a communicable range. The generated space is kept stable as long as possible even if some machines join or leave the communicable range. We have designed an initial prototype of Ad-hoc Filesystem and have conducted preliminary evaluations on the simulator. Our design is strongly based on an assumption such that people who wish to work together would form a stable group with a single mobility behavior. Based on the assumption, our prototype distributes files among multiple machines and duplicates each on two machines, then it keeps the pairs of such machines as long as possible. We also introduced another strategy to increase file availability by exploiting each machine’s client cache. The simulation results show that controlling packets used in our prototype to maintain system state hardly affects the overall system performance. Also the result indicates that our strategy that keeps two replicas for each data and exploits client caching is effective to achieve high availability.

1

Introduction

Currently, our mobile computing environment is getting split into two extremes: private one which is isolated on each machine and public one which is connected to the huge virtual world, Internet. Usually we can manage things well by choosing them appropriately. However, this also means that we cannot share information easily even with people here. We can carry our mobile machines around freely, but our machines are remain disjointed. In order to share information with people around, we have to connect to the Internet via somehow charged telephone lines and with distant providers. Some machines have peer-to-peer communication functionality like IrDA, with which two machines can connect to each other. However, even with such functionality, we should also have tough time to share information with two P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 177–185, 2001. c Springer-Verlag Berlin Heidelberg 2001 

178

K. Yasuda and T. Hagino

or more machines. Things are almost same for more rich functional computers. With such computers, we may be able to set up local server to share information temporarily, but such way will significantly degrade the advantage of mobility. Thus, our question is simple and natural: why we cannot share information easily with people HERE? In order to improve such situations, we propose a new filesystem named “Ad-hoc Filesystem”. Ad-hoc Filesystem is a serverless filesystem which automatically generates temporary shared space among multiple mobile machines when they gather in a communicable range. The generated space is freely available for participating machines and can be used for any temporary work there. In addition, Ad-hoc Filesystem keeps the shared space stable as long as possible, even if some of machines arbitrarily join or leave the space. The design of Ad-hoc Filesystem is strongly motivated by the recent wireless network technologies and advances of ad-hoc network techniques [8,12]. However, our objective intending to construct a filesystem on fully unwired networks emerges several difficulties which have not existed in existing network filesystems such as [1,14,11]. In this paper, we describe our prototype design of Ad-hoc Filesystem and show the simulation results which demonstrates how our design works and realizes the system.

2

Assumptions

Our design is strongly based on an assumption such that people who wish to work together would gather and form a logical group with a single mobility behavior. Such mobility model is much studied in a research area of mobility models for ad-hoc networks, and is considered far more realistic than random walk mobility assumptions [7]. In addition to the basic assumption, we assume that two (or more) machines rarely leave the group simultaneously as long as they wish to work together. Our assumption means that our fucus sits on the group virtually formed by multiple machines, rather than on each one who may leave or join. This simplifies problems we should attack and makes our design practical. We should also take account of several issues relating wireless network characteristics. We have defined that the “communicable range” as single-hop wireless transmission range. Because our initial target is IEEE 802.11b wireless LAN devices which have a 50m nominal range, we expect that the range of singlehop would be enough to realize main concept of the virtual group in Ad-hoc Filesystem. Focusing on single-hop also greatly simplifies our design. Currently our design does not assume possibility of nonuniform propagation characteristics of wireless transmission.

Ad-hoc Filesystem

179

(A) advertises (A) entry_1

(B) advertises (B)

/share entry_2 entry machine entry_1 (A) entry_2 (B) ... mapping table

Fig. 1. Maintaining Directory Entries by Using Advertising Packets

3

Design

In the initial stage of designing Ad-hoc Filesystem, we have much focused on one point: maintaining redundancy for each file and increasing file availability. In order to realize stable shared file space among unstably networked machines, we designed an initial prototype based on a simple strategy – master and shadow. 3.1

Master and Shadow

The main keys in our initial prototype is roughly divided into following two. First, because we cannot assume a central server which should not move in or out of the communicable range, the system distributes each file among participating machines. Hence, in our system we can say that every machine is both server and client. In order to manage mappings between each top-level directory entry and its serving machine, our initial prototype uses a soft-state mechanism named advertising. Each machine periodically broadcasts advertising packet which advertises that the machine is alive and is responsible for serving the providing directory entries (figure 1). Second, not to lose any data regardless of group reconfigurations, the system keeps redundancy by maintaining duplications for all the data. Based on our assumptions, two machines rarely leave the group at the same time, Ad-hoc Filesystem replicates every file on two different machines. Keeping the pair of these two machines, called master and shadow, is essential in our system. How the shared space is generated and used is as follows. First, when two or more machines gather in a communicable range, an empty shared space is virtually formed and becomes available. When one of them put a file on the shared space, the machine becomes master (First Writer policy) and begins searching another machine to initiate shadow for the file. Then the machine who put the file is responsible for accepting filesystem requests and begins periodic advertising broadcast. After that, if the machine leaves the area and becomes isolated, other remaining machines can still access the file and see the shared space stably. In order to keep master-shadow pair, each shadow is responsible for replying ack packtes to advertising packets from its master. Notice that the advertising

180

K. Yasuda and T. Hagino

packets are broadcast but the ack packets with them are unicast and replied by only one machine, its shadow, therefore it is not necessary to worry about packet flooding. Every master-shadow pair obeys simple rules as following. – If a master leaves the area, - the shadow becomes a new master, - and it begins searching a candidate for its new shadow. – If a shadow leaves the area, - the master begins searching a candidate for its new shadow. Searching candidate machines for its shadow is done by choosing random machine from the set of known machines if the master have received keep-alive advertises from enough number of other machines. Otherwise, the master sends search shadow request as broadcast to choose its shadow. Machines which receive this packet and have available free space for the shared space should reply shadow propose with it. To avoid packet collisions among some or all of these replies and naturally achieve load balancing, each machine delays slightly and performs following actions before replying with it: 1. A machine picks a delay period d = K × (p + r), where p is the number of files the machine is currently providing (including both master and shadow), r is a random number between 0 and 1, and K is a small constant. 2. The machine delays transmitting the reply for a period of d. 3. Within this delay period, the machine promiscuously receives all packets. If the machine receives a reply packet during the delay period, it cancels the reply. 4. Otherwise, the machine transmits the reply packet after the delay period. Therefore, the master searching shadow will ideally get only one reply and can initiate shadow on the most appropriate one. 3.2

Exploiting Client Cache

Our initial prototype based on master and shadow does not assume any user activity on the filesystem nor existence of client caching. However, as observed in previous research for mobile filesystems [10,13], client caching can effectively used to increase file availability on each client in disconnected state. Although disconnected operation on each machine is not our main goal, client cache may also be exploited to increase availability for the whole system in our prototype. There are also several advantages if the system can exploit client cache. First, since each machine will cache files when it opens them, important files which have been opened by many machines will have got a lot of copies in the group. Second, machines which open many shared files will be supposed to be active on the group activity, hence they are also supposed to remain in the group relatively longer than others. Therefore, by exploiting client caching, important files will be able to have many cached copies on active (thus stable) machines.

Ad-hoc Filesystem

181

Based on the above considerations, we re-designed our prototype to be more realistic. The basic strategy is hinted by an idea of disconnected operation [10] and cooperative caching [5,4]. Each machine caches whole file data on open. When the master machine becomes unavailable, other machines try to locate an alternative machine which have the latest cached copy of the file. On worst case, each machine will be able to choose the latest one by performing broadcast query and collecting answers. However, if a large number of machines perform broadcast at the same time when the master disappears, the network will be flooded easily. To avoid such broadcast storms, our prototype let machines choose one coordinator machine for the file. Instead of letting each machine solve the problem independently, the coordinator maintains cache status for the file and performs broadcast as a representative of every other machine if cache information is not available at that time. To minimize broadcast overhead, each machine chooses a coordinator by non-networking operation, i. e. using consistent hash functions. Consistent hash enables multiple machines to locate one identical machine on most cases even without consistent view of the network among machines. Each machine performs as follows: 1. Each machine calculates hash values for each other machine in the group. Machines are collected by exchanging keep-alive messages such as advertising. 2. When a machine wants to open a file whose master has become unavailable, it calculates the hash value for its path name, then it chooses a coordinator whose hash value is nearest to the file’s hash value. 3. The machine consults with the coordinator about the file. 4. If the coordinator has not known enough information about the file, it performs broadcast and collects information about the file’s cached copies on other machines. 5. Once the coordinator has got information about the file, it can locate the new master machine which has the latest copy and can tell others about it. While the master stays in the group, the master itself manages the multiple cached copies. The master can also inform the coordinator about the status of cache beforehand, thus the coordinator will rarely have to perform broadcast as long as the master and the coordinator leave the group simultaneously.

4

Simulation Results

To evaluate performance and validity of our design, we have implemented a simulator of Ad-hoc Filesystem using a packet-level simulation language called PARSEC [2]. The simulation parameters were chosen to model a network consisting of 10 mobile nodes moving around in a square area. The communication medium used in the simulation was IEEE 802.11b Wireless LAN with the bandwidth 2 Mbytes per second and the communication radius of 50m. Each simulation was

182

K. Yasuda and T. Hagino Table 1. Parameter Values Used in Simulations Parameter Value Period between advertising broadcasts 5 sec Max # of search shadow retransmissions 5 Max time to wait for a shadow reply 1000msec # of allowed advertising losses before each machine 5 assumes the master is disconnected # of allowed advertising losses before shadow begins 3 advertising

a run for 60 minutes in simulated clocks, and each node created and opened files at randomly selected times throughout the simulation. The average size of files created by nodes was 10 Kbytes. The parameter values used in simulations are listed in table 1. Figure 2 shows the measured overhead of control broadcast packets. In this simulation, we used an area of 40m square and each node was initially placed at a random position within the area. During the simulation, each node moved to a random spot with a velocity between 0 and 1.0 meters per second, and paused at its current location for a short period of 60 seconds. To measure effects of broadcast to data throughput, node 0 was continuously sending data to node 1. The observed throughput between node 0 and node 1 is also shown in the figure. X-axis describes the total number of files created in each simulation. The result shows that the broadcast packets hardly affect the observed throughput, though the traffic increases as the number of files increases. Although the measured traffic remains very small in our all simulations, it is clear that the traffic will affect the throughput if the number of files increases up to a very large number such as several hundreds. However, we expect our decision will be reasonable, because the shared directory are designed for temporary use: it is generated as empty and disappears after a while, so that it would not include such a large number of files. Figure 3 shows effects of redundancy by shadows. Our main concern is to provide stable file space for machines within a group which is naturally formed by multiple machines. To simulate and evaluate a visible file space within such a group, each node is arranged to perform as following in the simulations: 1. enters the group (i. e. communicable range) at random time, 2. stays in the group during the random period, then 3. leaves the group at random time. Each node created files while it stays in the group, and the total number of created files were 20 for each run. Each node leaves the group arbitrarily, but we made one restriction for the mobility: each node cannot leave the group if the group has only the one node at the time. Hence, the group remained having at least one node for the simulation period. In figure 3, x-axis shows percentages of average time each node stays in the group and y-axis shows percentages of open call failures during the runs. We

Overhead (B) and Throughput (KB)

Ad-hoc Filesystem 1000

183

Control Packets (bytes) Measured Throughput (Kbytes)

900 800 700 600 500 400 300 200

5

10 15 20 25 # of Files Created in the Simulation

30

Fig. 2. Overhead of controlling packets.

have run this simulation with various random seed numbers for each case, the case without shadows, the case with shadows, and the case with shadows and client caching. In 3, each dot describes the result of each run. The result shows that our strategy using shadow and client caching can effectively increase file availability. With shadows, the open calls performed by each node hardly fails, though some failures are still observed when average time each node stays in the group is very short, e. g. less than 35%. On the other hand, if the system also exploit the client caches to increase availability, open call failures can be avoided almost at all.

5

Related Work

There are several researches in an area of serverless filesystems, but all of them have quite different assumptions for underlying machines and networks from our work. For example, xFS [1] is an early one of serverless network filesystems, but it is targeted workstation clusters tightly connected via fast switched LANs. A technique using hash functions to locate one machine in a distributed system is much studied in various research areas. In an area of cooperative caching, PACA [4] uses a hashing technique to locate a client which should keeps a cached copy. [9] uses consistent hashing to manage distributed cooperative Web caching. Some of recent peer-to-peer mechanisms like FreeNet [6] also uses hash functions to locate each data. The philosophy of FreeNet such that important files should be naturally cached on many sites much affected our design of Ad-hoc Filesystem too. In an area of ad-hoc networks, several multi-hop routing techniques have been studied ([8,12]). Although currently Ad-hoc Filesystem does not assume multi-hop wireless networks, some techniques are borrowed from them, such as delaying replies with broadcast packets and promiscuously receiving other packets within the delay period.

184

K. Yasuda and T. Hagino 50

No Shadow With Shadow (No Cache) With Shadow (With Cache)

45 Open() failure (%)

40 35 30 25 20 15 10 5 0

20

30

40

50

60

70

80

Average time each node stays (%)

Fig. 3. Effects of shadows and effects of exploiting client cache.

6

Conclusion

In this paper, we have described design of Ad-hoc Filesystem, which is a serverless filesystem that automatically generates a temporary shared work space among mobile machines when they gather as near as they can communicate. Our system will be the first network filesystem targeting ad-hoc wireless networks and is motivated by several techniques and characteriscs of wireless networks. Our main challenge is how to keep the shared space stable even if some of machines arbitrarily join and leave the space. We effectively simplify the problem by making one assumption such that people who wish to work together would form a stable group in an area. The system distributes all files among participating machines and intend to keep pair of master and shadow for each file. The system also exploits client caching to increase availability for the entire group, and uses a hash technology to manage multiple client caches in the unstable group. Based on our initial design, we have implemented a packet level simulator to evaluate our prototype. The simulation results show that the broadcast packets used in our prototype to maintain system state hardly affects the overall network performance. Also the results indicate that our strategy such that keeps two replicas for each data is effective to provide enough stability and availability. We have just finished the first step of designing Ad-hoc Filesystem. Although further investigation based on system-level implementation remains important work, we believe that the prototype has a contribution to realize the possibility of ad-hoc filesystem by synthesizing number of previous works in areas such as disconnected operation, cooperating caching, consistent hash, and ad-hoc wireless networks.

Ad-hoc Filesystem

185

References 1. T. Anderson, M. D. Dahlin, J. M. Neefe, D. A. Patterson, D. S. Roselli, and R. Y. Wang., Serverless Network File System, In Proceedings of 15th ACM Symposium on Operating Systems Principles, ACM, Copper Mountain Resourt, Colorado, Dec 1995. 2. R. Bagrodia, R. Meyer, M. Takai, Y. Chen, X. Zeng, J. Margin, and H. Y. Song., PARSEC., A Parallel Simulation Environment for Complex Systems, IEEE Computer, 31(10).,77-85, Oct 1998. 3. A. Birrell, A. Hisggen, C. Jerian, T. Mann, and G. Swart., The Echo distributed file system. In Technical Report 111, Degital Equipment Corp., Systems Research Center, Palo Alto., CA, 1993. 4. T. Cortes, S. Girona, and J. Labarta., PACA: A Cooperative File System Cache for Parallel Machines., In Proceedings of the 2nd International Euro-Par Conference, I:477–486, 1996. 5. M.Dahlin, R.Wang, T.Anderson, and D. Patterson. Cooperative Caching., Using Remote Memory to Improve File System Performance. In Proceedings of 1st OSDI, Nov 1994. 6. The Free Network Project. http://freenet.sourceforge.net/. 7. X. Hong, M. Gerla, G. Pei, and C.-C. Chiang, “A Group Mobility for Ad Hoc Wireless Networks,” In Proceedings of ACM/IEEE MSWiM’99, Seattle, WA, Aug. 1999, pp.53-60. 8. D. B. Johnson., Dynamic Source Routing in Ad Hoc Wireless Networks, In Proceedings of the Workshop on Mobile Computing Systems and Applications, pp. 158-163, IEEE Computer Society, Santa Cruz, CA, Dec 1994. 9. D. Karger, A. Sherman, and et al., Web Caching with Consistent Hasing, In Proceedings of WWW8, May 1999. 10. J. J. Kistler and M. Satyanarayanan., Disconnected Operation in the Coda File System., ACM Transactions on Computer Systems, 10(1).,3-25, Feb 1992. 11. J. Howard, M. Kazar, S. Menees, D. Nichols, M. Satyanarayanan, R. Sidebotham, and M. West., Scale and Performance in a Distributed File System. ACM Transactions on Computer Systems, 6(1).,51-82, Feb 1988. 12. E. Royer and C. Toh, “A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks”, IEEE Personal Communications, Apr. 1999. 13. D. Terry, M. Theimer, K. Petersen, A. Demers, M. Spreitzer, and C. Hauser., Managing Update Conflicts in Bayou, a Weakly Connected Replicated Storage System. In Proceedings of the Fiftheenth ACM Symposium on Operating Systems Principles, pp.172-183, Dec 1995. 14. D. Walsh, B. Lyon, G. Sager, J. M. Chang, D. Goldberg, S. Kleiman, T. Lyon, R. Sandberg, and P. Weiss., Overview of the Sun Network File System. In Proceedings of the 1985 USENIX Winter Conference, Dec 1995.

A Review of Current On-demand Routing Protocols 1

1

Mehran Abolhasan , Tadeusz Wysocki , and Eryk Dutkiewicz

2

1

Switched Network Research Centre, University of Wollongong, Australia, 2522 {ma11, wysocki}@uow.edu.au 2 Motorola Australia Research Centre, 12 Lord St, Botany, NSW 2525, Australia [email protected]

Abstract. Mobile ad hoc networks are data networks entirely made up of enduser communication terminals (known as nodes). Each node in the network can act as an information sink (i.e. a receiver), a source and a router. All nodes have a transmission range, which is limited by their transmission power, attenuation and interference. Mobile ad hoc networks have a number of disadvantages over wired networks. These include limited bandwidth in the wireless medium, limited power supply and mobility. The traditional routing algorithms such as DBF will not work in such networks due to lack of scalability and ability to cope with highly mobile networks. Recently, a number of routing protocols have been designed to overcome these issues. These protocols can be classified into three different categories: global, on-demand and hybrid routing. In this paper, we provide a performance comparison for on-demand routing protocols, which is based on a number of different parameters. This paper also considers which protocol characteristics will produce better performance levels in these networks, and what improvements can be made to further increase the efficiency of some of these routing protocols. Keywords: On-demand routing, Mobile ad-hoc networks, Uni-cast routing protocols.

1

Introduction

Mobile wireless communication networks can be classified into two categories: infrastructured and infrastructureless mobile networks. The infrastructured networks have base stations that are used to provide a communication barrier (or a bridge), between the mobile nodes [1]. The infrastructureless networks (commonly known as “Ad-Hoc networks”) have no centralized controller or a fixed router. Each mobile node in the network acts as a router, which means that they are capable of determining and maintaining routes to nodes in the network. Each node in such a network has a transmission range, which is limited by the transmission power, attenuation and interference. Direct communication can occur between two intermediate nodes if they are within each other’s transmission range [2]. Mobile ad hoc networks have numerous types of applications, ranging from the search and rescue operations where the rescue team can combine their efforts to save victims of fire, earthquakes and other natural disasters [3], to the highly dynamic battlefield environment where different types of forces require to exchange P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 186–195, 2001 © Springer-Verlag Berlin Heidelberg 2001

A Review of Current On-demand Routing Protocols

187

information rapidly. The main advantage of infrastructureless networks is that they allow mobile devices to communicate in places where no centralized controller exists, such as in the middle of a jungle or a desert. However, before mobile ad hoc networks can be used successfully in the scenarios described above, an intelligent routing strategy is required to efficiently use the limited resources in these networks, namely, bandwidth, power and storage space. The aim of this paper is to provide a performance comparison for the currently proposed on-demand routing protocols. It also presents a number of ways in which the efficiency of some of these protocols can be improved. In addition, the paper discusses future research directions in designing more efficient routing protocols. Section 2 gives an overview of the currently proposed routing protocols by classifying them into different categories and discussing the fundamental methodology used in each category. Section 3 provides a performance comparison of the currently proposed on-demand routing protocols, which is based on their theoretical routing cost and basic characteristics. Moreover, it discusses different methodologies, which can improve their performance. Section 4 concludes the paper.

2 Overview of Current Routing Protocols Ever since the early 1970’s a number of routing protocols have been proposed for mobile ad-hoc networks. Many of these protocols are direct descendents of the traditional Link State and distance vector algorithms. These routing protocols can be categorized into three different groups: Global/Proactive, On-demand/Reactive and Hybrid (reactive and proactive) routing protocols. In Global routing protocols, the routes to all destinations are determined at the start up, and they are maintained via periodic update processes [4]. In On-demand routing protocols, the routes are determined when they are required by the source. Hybrid routing protocols exhibit both the reactive and proactive properties at different times. 2.1

Global/Proactive Routing Protocols

In global routing protocols, each node stores and maintains routing information to every other node in the network. The routing information is usually kept in a number of tables. These tables are periodically updated as the network topology changes. The differences between these routing protocols exist in a way the routing information is updated, detected, and the type of information kept at each routing table (note that each protocol may also have a different number of tables) [1]. Global routing protocol can be divided into two separate categories: Flat and Hierarchical. In networks employing flat-routing protocols, all nodes are treated equally and routing is based on peer-to-peer connection (intermediate nodes), which is restricted by the propagation condition of the network. Some examples of the flat global routing protocols include DSDV [18], WRP [17], FSR [5], GSR [11] and DREAM [6]. Hierarchical networks are made up of a number of levels (usually there are at least 2 levels). On the lowest level, the nodes with the closest geographical proximity form a cluster. In each cluster, at least one node is designed to serve as a “gateway”, which

188

M. Abolhasan, T. Wysocki, and E. Dutkeiwicz

usually has a higher transmission range than the other nodes. All communications between nodes in different clusters are done through the gateway node [9]. Each cluster also has a cluster-head, which controls the transmission there. Hierarchical based routing strategies have been designed to overcome the scalability problem that exists in most of such flat global routing strategies, by introducing a structure to the network. Recently, a number of hierarchical routing strategies have been proposed. Some examples of the most recent proposals include CGSR [12], MMWN [20], HSR [10] and STAR [19]. 2.2 On-demand/Reactive Routing Protocols In on-demand routing protocols, routes are created when required by the source node, rather than storing up-to-date routing tables. The specific aim of on-demand routing is to reduce the bandwidth and storage space used in table driven protocols. In this strategy, routes are generally created and maintained by two different procedures, namely: route discovery and route maintenance. Route discovery procedure is used when a node requires a route to a certain destination. This is achieved by flooding Route Request packets through the network. When a route is found, the destination sends a Route Reply packet, which contains the hop-by-hop address from the source to destination. Once the connection is established, it is maintained by route maintenance procedures until the destination is no longer reachable or the route is not required [1]. Some examples of on-demand routing protocols include: DSR [15], AODV [13], LMR [22], TORA [14], ABR [24], SSR [23], RDMR [16], LAR [7], CBRP [25], ROAM [26]. Section 3 provides a performance comparison for these routing protocols. 2.3 Hybrid Routing Protocols Hybrid routing protocols combine the basic properties of the two classes of protocols mentioned earlier into one. That is they are both reactive and proactive in nature. The primary objectives of these protocols are to minimize the route construction delay, which is the main problem with reactive routing protocols, and reduce bandwidth usage of the periodic update procedures in proactive protocols. This is achieved by performing some operations proactively and others reactively. That is, using the proactive and reactive operations where they are best suited with the examples Hybrid protocols being ZRP[8] and ZHLS[21].

3 Comparison of Current On-demand Routing Protocols 3.1 Characteristic Comparison The discussion in this section is based on Tables 1 and 2. Table 1 provides a comparison of the basic characteristics and Table 2 illustrates the complexity

A Review of Current On-demand Routing Protocols

189

comparison. Note that the complexity comparison represents the worst-case scenario for each protocol. The AODV routing protocol is based on DSDV and DSR algorithm. It uses the periodic beaconing and sequence numbering procedure of DSDV and a similar route discovery procedure as in DSR. However, there are two major differences between DSR and AODV. The most significant difference is that in DSR each packet contains the full routing information, whereas in AODV the packets carry the destination address only. This means that AODV has potentially less routing overheads than DSR. The other difference is that the route replies in DSR carry the address of every node along the route, whereas in AODV the route replies only carry the destination IP address and the sequence number [1]. The advantage of AODV is that it is adaptable to highly dynamic networks. However, node may experience large delays during route construction, and link failure may initiate another route discovery, which introduces extra delays and consumes more bandwidth as the size of the network increases. As stated earlier, the DSR protocol requires each packet to carry the full address from source to the destination. This means that the protocol will not be very effective in large networks. Since the amount of overhead carried in the packet will continue to increase as the network size increases. Therefore in highly dynamic and large networks, the overhead may consume most of the bandwidth. However, this protocol has a number of advantages over routing protocols such as AODV, LMR and TORA, and in small to medium size networks (perhaps up to a few hundred nodes), this protocol may perform better. An advantage of DSR is that nodes store multiple routes in their route cache, which means that the source node can check its route cache for a valid route before initiating a route discovery. Certainly, if a valid route is found there is no need for route discovery. This is very beneficial in network with low mobility, since the routes stored in the route-cache will be valid longer. Another advantage of DSR is that it does not require any periodic beaconing. Therefore nodes can enter sleep node to conserve their power. This also saves a considerable amount of bandwidth in the network. The ROAM routing protocol uses internodal coordination along directed acyclic sub-graphs, derived from the routers’ distance to the destination. This operation is referred to as a “diffusing computation” [26]. An advantage of this protocol is that it eliminates the search-to-infinity problem present in some of the on-demand routing protocols by stopping multiple flood searches when the required destination is no longer reachable. Another advantage is that each router maintains entries (in a route table) for destinations flowing data packets through them. This reduces significant amount of storage space and bandwidth needed to maintain an up-to-date routing table [26]. Another novelty of ROAM is that each time the distance of a router to a destination changes by more than a defined threshold, it broadcasts update messages to its neighbouring nodes, as described earlier. Although this has the benefit of increasing the network connectivity, in highly dynamic networks it may prevent nodes entering sleep mode to conserve their power.

190

M. Abolhasan, T. Wysocki, and E. Dutkeiwicz

Table 1: Basic characteristics of on-demand routing protocols. Protocol

Routing

Multiple

Beaconing

Route metric

Routes

Route

structure

routes

requirements

method

maintained in

maintenance

Yes, hello

Freshest & SP

Route Table

method

availability AODV

F

No

messages. DSR

F

Yes

No

Erase Route then SN

SP, or next

Route Cache

Erase Route then SN

available in route cache. ROAM

F

Yes

No

SP

Route Table

Erase Route & **

LMR

F

Yes

No

SP, or next

Route Table

available route. TORA

F

Yes

No

SP, or next

Route Table

available route. ABR

F

No

Yes

Strongest

Link reversal & Route repair Link reversal & Route repair

Route Table

LBQ

Associativity & SP & * SSR

F

No

Yes

Strongest

Route Table

Associativity &

Erase Route then SN

stability RDMR

F

No

No

Shortest relative

Route Table

Distance or SP LAR

F

Yes

No

SP

Erase Route then SN

Route Cache

Erase Route then SN

(DSR based) CBRP

H

No

No

First available

Route Table at

Erase Route

route (first fit)

cluster head

The SN & local route repair

H = Hierarchical

F = Flat

SP = Shortest Path

SN = Source Notification (via route error message)

LBQ = Localize Broadcast Query. * Route relaying load and cumulative forwarding delay. ** Start a diffusing search if a successor is available, else send a query with infinite metric.

The LMR protocol is another on-demand routing protocol using a flooding technique to determine its routes. The nodes in LMR maintain multiple routes to each required destination. This increases the reliability of the protocol by allowing nodes to select the next available route to a particular destination without initiating a route discovery procedure. An advantage of this protocol is that each node only maintains routing information to their neighbours. As a result, extra delays and storage overheads associated with maintaining complete routes can be avoided. However, LMR may produce temporary invalid routes, which introduces extra delays in determining a correct loop. The TORA routing protocol is based on the LMR protocol. It uses similar link reversal and route repair procedure as in LMR, and also the creation of a DAGs, which is similar to the query/reply process used in LMR [1]. Therefore, it also has same benefits as LMR. The advantage of TORA is that it has reduced the far-reaching

A Review of Current On-demand Routing Protocols

191

control messages to a set of neighbouring nodes, where the topology change has occurred. In addition TORA also supports multicasting. However, this is not incorporated into its basic operation. TORA can be used in conjunction with Lightweight Adaptive Multicast algorithm (LAM) to provide multicasting. The disadvantage is that algorithm may produce temporary invalid routes as in LMR. ABR is another source initiated routing protocol. It also uses a query-reply technique to determine routes to the required destinations. However, route selection is primarily based on stability in ABR. To select stable route each node maintains an associativity tick with their neighbours, and the links with higher associativity tick are selected in preference to the ones with lower associativity tick. Albeit this may not lead to the shortest path to the destination, the routes tend to last longer. Therefore, fewer route reconstructions are needed, and more bandwidth will be available for data transmission. The disadvantage of ABR is that it requires periodic beaconing to determine the degree of associativity of the links. This beaconing requirement forces all nodes to stay active resulting in additional power consumption. Another disadvantage is that it does not maintain multiple routes or a route cache, which means that alternate routes will not be immediately available, and a route discovery will be required after link failure. However, ABR has to some degree compensated for not having multiple routes by initiating a localized route discovery procedure. SSR is a descendent of ABR. SSR selects routes based on signal strength and location stability rather than using an associativity tick. As in ABR, the routes selected in SSR may not result in the shortest path to the destination. These routes, however tend to live longer resulting in less route reconstructions. One disadvantage of SSR when compared to DSR and AODV is that intermediate nodes cannot reply to route requests sent toward a destination. This may potentially create long delays before a route can be discovered, because the destination is responsible for selecting the route for data transfer. Additionally, no attempt is made to repair routes at the point were the link failure occurs. In SSR the reconstruction occurs at the source. This may introduce extra delays, since the source must be notified of the broken like before another one can be searched for. Therefore, it would be interesting to investigate the effect of introducing a localized route repair methodology in SSR. Additionally, one would have one to compare the performance between “intermediate node” replying against the “destination node only” reply strategy. RDMR attempt to minimize the routing overheads by calculating the distance between the source and the destination, therefore limiting each route request packet to certain number of hops. This means that the route discovery procedure can be confined to localized region. RDMR also uses the same technique when link failures occur. This conserves a significant amount of bandwidth and the battery power. Moreover, RDMR does not require a location-aided technology to determine the routing patterns. However, the relative-distance micro-discovery procedure can only be applied if the source and the destinations have communicated previously. If no previous communication record is available for a particular source and destination, then the protocol will behave in the same manner as the flooding algorithms. LAR is based on flooding algorithms (such as DSR) [7]. It attempts to reduce the routing overheads present in the traditional flooding algorithm by using location information. This protocol assumes that each node knows its location through a GPS. Two different LAR schemes were proposed in [7], in the first scheme a request zone is calculated, which defines a boundary where the route request packets can travel to reach the required destination. The second method stores the coordinates of the

192

M. Abolhasan, T. Wysocki, and E. Dutkeiwicz

destination in the route request packets. These packets can only travel in the direction were the relative distance to the destination becomes smaller as they travel from one hop to another. Both methods limit the control overhead transmitted through the network and hence conserve bandwidth. They will also determine the shortest path (in most cases) to the destination, since the route request packets travel away from the source and towards the destination. One disadvantage of this protocol is that each node is required to carry a GPS. Moreover, the protocols may behave similarly to flooding protocols (e.g. DSR and AODV) in highly mobile networks. Unlike the on-demand routing protocols described so far, in CBRP, the nodes are organized in a hierarchy. As in most hierarchical protocols, the nodes in CBRP are grouped into clusters. Each cluster has a cluster-head, which coordinates the data transmission within the cluster and to other clusters. The advantage of CBRP is that only cluster heads exchange routing information. Hence, the number of control overhead transmitted through the network is far less than in the traditional flooding methods. Of course with any other hierarchical routing protocol, there are overheads associated with cluster formation and maintenance. The protocol also suffers from temporary routing loops. This is because some nodes may carry inconsistent topology information due to long propagation delays.

3.2 Routing Cost Comparison and Scalability Generally, most on-demand routing protocols have the same routing cost when considering the worst-case scenario. This is due to their fundamental routing nature, as they all follow similar route discovery and maintenance procedure. For example, protocols such as RDMR and LAR have the same cost as the traditional flooding algorithm in the worst-case scenario. The worst-case scenario applies to most routing protocols when there is no previous communication between the source and the destination. This is usually the case during the initial stages (i.e. when a node comes on-line). As the nodes stay longer on, they are able to update their routing tables/caches and become more aware of their surroundings. Some protocols take advantage of this more than the others. For example, in DSR when a route to a destination has expired in the route cache, the protocol initiates a network wide flooding search to find an alternate route. This is not the case for LAR or RDMR where the route history is used to control the route discovery procedure by localizing the route requests to a calculated region. Clearly, this is more advantageous in large networks, since more bandwidth is available there for data transmission. Another method used to minimize the number of control packets is to select routes based on their stability. In ABR and SSR the destination nodes select routes based on their stability. ABR also allows shortest path route selection to be used during the route selection at the destination (but only secondary to stability), which means that shorter delays may be experienced in ABR during data transmission than in SSR. These protocols may perform better than the purely shortest path selection based routing protocols such as DSR. However, they may experience scalability problem in large network since each packet is required to carry the full destination address. This is because the probability of a node in a selected route becoming invalid will increase by O(a.n), where “a” is the probability of the route failing at a node and “n” is the

A Review of Current On-demand Routing Protocols

193

number of nodes in the route. Therefore, these protocols are only suitable for small to medium size networks. Table 2: Complexity comparison of the on-demand routing protocols. Protocol

TC[RD]

TC[RM]

CC[RD]

CC[RM]

Advantage

Disadvantage

AODV

O(2d)

O(2d)

O(2N)

O(2N)

Adaptable to

Scalability problems,

highly dynamic

large delays, hello

networks.

messages.

Route cache,

Scalability problems

promiscuous

as network size grows.

overhearing.

Control packets carry

DSR

O(2d)

O(2d)

O(2N)

O(2N)

full address. Large delays ROAM

O(d)

O(a)

O(|E|)

O(6Ga)

Elimination of

May experience large

search-to-infinity

CO in highly mobile

problem.

environments, as number of threshold update increase.

LMR

O(2d)

O(2d)

O(2N)

O(2a)

Multiple routes

Temporary routing loops.

TORA

O(2d)

O(2d)

O(2N)

O(2a)

Multiple routes

Temporary routing loops.

ABR

O(d + f)

O(b + f)

O(N + e)

O(a + e)

Stability of

Each packet carries

routes.

full address to destination.

SSR

O(d + f)

O(b + f)

O(N + e)

O(a + e)

Same as ABR

Large delays during route failure and reconstruction.

RDMR*

O(2d)

O(2d)

O(2N)

O(2N)

Localized route

Flooding used if there

discovery.

is no prior communication between nodes.

LAR*

O(2S)

O(2S)

O(2M)

O(2M)

Controlled route

Requires GPS, may

discovery.

act similar to flooding in highly mobile networks.

CBRP*

O(2d)

O(2b)

O(2x)

O(2a)

Only cluster

Cluster maintenance,

heads exchange

temporary loops.

routing information. TC = Time Complexity. CC = Communication Complexity. RD = Route Discovery. RM = Route Maintenance. CO = control Overhead.

d = diameter of the network. x = number of clusters (each cluster has one cluster-head)

N = number of nodes in the network. e = number of nodes forming the route reply path. a = number of affected nodes. f = diameter of directed path of the route reply. b = diameter of the affected area. G = maximum degree of the router. |E| = Number of edges in the network. S = diameter of the nodes in the request zone. M = number of nodes in the request zone.

194

M. Abolhasan, T. Wysocki, and E. Dutkeiwicz

Reduction in control overhead can be obtained by introducing a hierarchical structure to the network. CBRP is a hierarchical on-demand routing protocol, which attempts to minimize control overheads disseminated into the network by breaking the network into clusters. During the route discovery phase, cluster-heads (rather than each intermediate node) exchange routing information. This significantly reduces the control overhead disseminated into the network when compared to the flooding algorithms. In highly mobile networks, CBRP may incur significant amount of processing overheads during cluster formation/maintenance. This protocol suffers from temporary invalid routes as the destination nodes travel from one cluster to another. Therefore, this protocol is suitable for medium size networks with slow to moderate mobility. The protocol may also best perform in scenarios with group mobility where the nodes within a cluster are more likely to stay together.

4

Conclusion

In this paper we have provided a performance comparison of current on-demand routing protocols. We have suggested a number of optimizations, which could improve the performance of some of the on-demand routing protocols, and suggested what type of network scenarios would best suite these protocols.

References 1.

Royer, E.M., Toh, C-K.: A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks, Vol. 6. No.2. IEEE Personal Communications (1999) 46-55 2. Johnson, D.B.: Routing in Ad Hoc Networks of Mobile Hosts, IEEE workshop on mobile computing systems and applications (1995) 158-163 3. Broch, J., Maltz, D.A., Johnson, D.B., Hu Y-C., Jetcheva, J.: A Performance Comparison of Multi-Hop Wireless Ad-Hoc Network Routing Protocols, MobiCom Dallas (1998) 8597 4. Iwata, A., Chaing, C., Pei, G., Gerla, M., Chen, T.: A Scalable Routing Strategy for MultiHop Ad-Hoc Wireless Networks, Vol. 17. No. 8. IEEE Journal on Selected Areas in Telecommunication (1999) 5. Pei, G., Gerla, M., Chen, T-W.: Fisheye State Routing: a Routing Scheme for Ad Hoc Wireless Networks, Vol.1. IEEE International Conference on Communications (2000) 70 –74 6. Basagni, S., Chlamtac, I., Syrotivk, V.R., Woodward, B.A.: A Distance Routing Effect Algorithm for Mobility (DREAM), Proc. Of fourth annual ACM/IEEE International Conference on Mobile Computing and Networking Mobicom 98 Dallas. Tx. (1998) 76-84 7. Ko, Y-B., Vaidya, N.H.: Location-Aided Routing (LAR) in Mobile Ad-Hoc Networks, Proc. Of ACM/IEEE Mobicom 98 Dallas. Tx. (1998) 8. Hass, Z.J., Pearlman, R.: Zone Routing Protocol for Ad-Hoc Networks, Internet Draft, draft-ietf-manet-zrp-02.txt, august 99 9. Hass, Z.J.: A New Routing Protocol for the Reconfigurable Wireless Networks, ICUPC’97 San Diego CA (1997) 10. Pei, G., Gerla, M., Hong, X., Chiang, C.: A Wireless Hierarchical Routing Protocol With Group Mobility, Vol.3. Wireless Communications and Networking Conference New Orleans (1999) 1538-1542

A Review of Current On-demand Routing Protocols

195

11. Chen, T., Gerla, M.: Global State Routing: A New Routing Scheme for Ad-Hoc Wireless Networks, Vol.1. IEEE International Conference on Communication (1998) 171-175 12. Chiang, C-C.: Routing in Clustered Multihop, Mobile Wireless Networks With Fading Channel, Proc. Of IEEE SICON’97 (1997) 197-211 13. Das, S., Perkins, C., Royer, E.M.: Ad Hoc On-Demand Distance Vector (AODV) Routing, Internet Draft, draft-ietf-manet-aodv-05.txt march 2000 14. Corson, S., Park, V.: Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification, internet draft, draft-ietf-manet-tora-spec-03.txt November 2000 15. Johnson, D., Maltz, D., Broch, J.: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks, internet Draft, draft-ietf-manet-dsr-03.txt October 1999 16. Aggelou, G., Tafazolli, R.: Distance Micro-Discovery Ad Hoc Routing (RDMR) Protocol, Internet Draft, draft-ietf-manet-rdmr-01.txt February 2000 17. Murthy, S., Garcia-Luna-Aceves, J.J.: An Efficient Routing Protocol for Wireless Networks, Vol.1. No. 2. ACM/Baltzer Mobile Networks and Applications (1996) 183-197 18. Perkins, C.E., Bhagwat, P.: Highly Dynamic Destination Sequenced Distance Vector Routing for Mobile Computers, Vol.1. Proce. of Computer Communication Rev. (1994) 234-244 19. Garcia-Luna-Aceves, J.J., Spohn, M.: Source Tree Adaptive Routing (STAR) Protocol, Internet Draft, draft-ieft-manet-star-00.txt October 1999 20. Kasera, K.K., Ramanathan, R.: A Location Management Protocol for Hierarchically Organized Multihop Mobile Wireless Networks, Proc. of IEEE ICUPC’97 October 1997 158-162 21. Joa-Ng, M., Lu, I-T., A Peer-to-Peer Zoned-based Two-level Link State Routing for Mobile Ad Hoc Networks, Vol.17. No.8. IEEE Journal on Selected Areas in Communications (1999) 1415-1425 22. Corson, M.S., Ephremides, A.: A Distributed Routing Algorithm for Mobile Wireless Networks, Vol.1. No.1. ACM/Baltzer Wireless Networks (1995) 61-81 23. Dube, R., Rais, C.D., Wang, K-Y., Tripathi, S.k.: Signal Stability-based Adaptive Routing (SSA) for Ad Hoc Mobile Networks, Vol.41. IEEE Personal Communications (1997) 3645 24. Toh, C-K.: Novel Distributed Routing Protocol to Support Ad Hoc Mobile Computing, Proc. of IEEE fifith Annual International Pheonix Conference (1996) 480-486 25. Jiang, M., Li, J., Tay, Y.C.: Cluster Based Routing Protocol, Internet Draft, Draft-ieftmanet-cbrp-spec-01.txt August 1999 26. Raju, J., Garcia-Luna-Aceves, J.J.: A New Approach to On-demand Loop-Free Multipath Routing, Proc. of eight International Conference on Computer Communication and Networks (1999) 522-527

Construction of Data Dependent Chaotic Permutation Hashes to Ensure Communications Integrity Josef Scharinger Johannes Kepler University, Altenbergerstraße 25, A-4040 Linz, Austria [email protected]

Abstract. Cryptographic hash functions and message digests are essential in secure communications because they aid in detecting incidental transmission errors caused by unreliable equipment and noisy environments, but also ensure message integrity in presence of intruders deliberately mounting cryptanalytic attacks. It is the purpose of this contribution to introduce a novel approach for generating cryptographic hashes computed from input data dependent pseudo-random permutations. Essentially, input messages are processed sequentially using bytes of input data as keys to discrete chaotic Kolmogorov systems which permute an initial message digest in a cryptographically strong manner heavily depending on the input stream. As will be shown this principle can lead to very efficient and strong message digests.

1

Introduction

In communication environments integrity of the data transmitted is a major concern. Checksums and parity bits were developed at the very beginning of digital communications to cope with unreliable equipment and can offer reasonable protection to detect incidental transmission errors, but only limited protection against malicious modifications and attacks to deliberately alter the content of messages transmitted. This has led to the development of cryptographic hashes [7,120,11] (digital fingerprints, message digests) that can check communication integrity even in presence of intruders mounting cryptanalytic attacks. Cryptographic hash functions are not limited to applications for communication integrity but constitute also an essential component in ensuring communication authenticity. Authenticity is achieved by the use of digital certificates. Once a partner certificate is trustworthy installed, any message received from that person can be checked for authenticity using his certificate. Since signature schemes available today [3,8,12] are very slow, it is impractical to sign large amounts of data. Instead a condensed representation (message digest) of the data is attached to the original data and just this message digest is actually signed, an approach that enhances performance, increases cryptographic security and P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 196–205, 2001. c Springer-Verlag Berlin Heidelberg 2001 

Construction of Data Dependent Chaotic Permutation Hashes

197

allows integrity checks in a unified framework. Therefore concepts for generating strong digital fingerprints are essential components also for ensuring integrity and authenticity in secure communications applications. It is the purpose of this contribution to introduce a novel approach for generating cryptographic hashes that provide secure digital fingerprints for arbitrary input data. These hashes are derived as 256 bit message digests computed from input data dependent pseudo-random permutations. Initially, a 16 × 16 = 256 bit square array is filled with pseudo-random bits. Next, input messages are processed sequentially using bytes of input data as keys to so-called discrete chaotic Kolmogorov systems which permute the square array in a cryptographically strong manner heavily depending on the input stream. Finally, the state obtained in the 16 × 16 array of bits is read out to provide the 256 bit cryptographic fingerprint. As will be shown in the sequel, this construction leads to very efficient and strong message digests.

2 2.1

Chaotic Kolmogorov Systems Continuous Kolmogorov Systems

Continuous Kolmogorov systems [1,4,6,15] act as permutation operators upon the unit square. Figure 1 is intended to give a notion of the dynamics associated with a specific Kolmogorov system parameterized by the partition π = ( 13 , 12 , 16 ). As can be seen, the unit square is first partitioned into vertical strips which are then stretched in the horizontal and squeezed in the vertical direction and finally stacked atop of each other. Just after a few applications (see figure 1 from top left to bottom right) this iterated stretching, squeezing and folding achieves perfect mixing of the elements within the state space.

Fig. 1. Illustrating the chaotic and mixing dynamics associated when iterating a Kolmogorov system.

198

J. Scharinger

Formally this process of stretching, squeezing and folding is specified as folk lows. Given a partition π = (p1 , p2 , . . . , pk ), 0 < pi < 1 and i=1 pi = 1 of the unit interval U and stretching and squeezing factors defined by qi = p1i . Furthermore, let Fi defined by F1 = 0 and Fi = Fi−1 + pi−1 denote the left border of the vertical strip containing the point (x, y) ∈ E to transform. Then the continuous Kolmogorov system Tπ will move (x, y) ∈ [Fi , Fi + pi ) × [0, 1) to the position Tπ (x, y) = (qi (x − Fi ), 2.2

y + Fi ). qi

(1)

Discrete Kolmogorov Systems

In our notation a specific discrete Kolmogorov system for permuting a data block of dimensions n × n is defined by a list δ = (n1 , n2 , . . . , nk ), 0 < ni < n and k i=1 ni = n of positive integers that adhere to the restriction that all ni ∈ δ must partition the side length n. Furthermore let the quantities qi be defined by qi = nni and let Ni specified by N1 = 0 and Ni = Ni−1 + ni−1 denote the left border of the vertical strip that contains the point (x, y) to transform. Then the discrete Kolmogorov system Tn,δ will move the point (x, y) ∈ [Ni , Ni +ni )×[0, n) to the position Tn,δ (x, y) = (qi (x − Ni ) + (y mod qi ), (y div qi ) + Ni ).

(2)

The restriction to integral stretching- and squeezing factors is necessary to keep resultant points at integer positions within the n × n grid. Use of the div (division of positive integers a and b delivering  ab ) and mod (remainder when dividing positive integers) operation ensures that points in n × n are mapped onto each other in a bijective and reversible manner. It is straightforward to check that in the case n = 16 a total of 55 different partitions δi (0 ≤ i ≤ 54) can be found to define permutation operators T16,δi on 16 × 16 2D arrays. Mapping byte values b ∈ [0..255] to valid partitions δi (e.g. according to i = b mod 55; see [13] for more alternatives), permutations T16,δi can be specified by bytes. Interpreting a message as a sequence of bytes, every message byte may thus be taken as a round-key to this permutation operator. This way a secure hash algorithm that generates strong 256 bit message digests as the result of message dependent pseudo-random permutations will be constructed. 2.3

Properties of Cryptographic Relevance

Kolmogorov systems tend to permute elements of the state space in a chaotic non-linear and apparently random fashion. After a sufficient number of iterations it becomes extremely hard for an observer to deduce the initial state of a Kolmogorov system from its final state. To be more specific, Kolmogorov systems offer very unique properties of cryptographic relevance that are explained in more detail in the sequel.

Construction of Data Dependent Chaotic Permutation Hashes

199

Ergodicity Ergodicity is important for a system that is to be applied in cryptography because it stands as a synonym for confusion. Informally speaking and expressed in terms of permutation systems, ergodicity stands for the property that almost any initial point will move to almost any other position in state space with equal probability as the system evolves in time. In other words there is no statistical way to predict the initial from the final position or vice versa. In the following we restrict attention to the practically most relevant case of n = pm being an integral power of a prime p. The discrete Kolmogorov system Tn,δr is defined by the list δr = (n1r , n2r , . . . , nkr r ) of length kr containing the positive integers to be used as key in round kr r. As mentioned before there are the restrictions 1 ≤ i ≤ kr , 0 < nir < n, i=1 nir = n and the constraint that all nir ∈ δr must partition the side length n. Furthermore let the stretching and squeezing factors qir to use for vertical strip number i in round number r be defined by qir = nnir . This results in quantities qir , qir ≥ p that also have to be integral powers of p because of the divisibility assumption made. Consider an arbitrary point (x, y) ∈ [Nir , Nir + nir ) × [0, n) in vertical strip number i to be transformed in round number r under the influence of the key δr (see equation 2 and figure 1). Coordinates x and y can  then be expressed tir by qir -adic representations of length tir = logqir n by x = j=1 xjr (qir )tir −j tir and y = j=1 yjr (qir )tir −j . Similarly Nir can be expanded according to Nir = tir tir tir−j and x−Nir may be expressed as x−Nir = j=1 xmjr (qir)tir−j . j=1 N ijr (qir) Obviously x is the sum of x − Nir and Nir . To clarify these relations, the following illustration should be helpful. x

y

xtir r . . . x3r x2r x1r y1r y2r y3r . . . ytir r xmtir r . . . xm3r xm2r 0 y1r y2r y3r . . . ytir r N itir r . . . N i3r N i2r N i1r 0 0 0 . . . 0 According to equation 2 application of Tn,δr will move the point (x, y) to a new position (x , y  ) = Tn,δr (x, y) with coordinates x = qir (x − Nir ) + (y mod qir ) and y  = (y div qir ) + Nir , as made clear by the subsequent figure. x

y

ytir r . . . xm4r xm3r xm2r 0 y1r y2r . . . y(tir −1)r 0 ... 0 0 0 N i1r N i2r N i3r . . . N itir r Suppose that lists δr are chosen independently and at random1 . Neglecting the constraint Nir ≤ x which follows from the fact that Nir is the left border of the vertical strip containing the point (x, y) for a moment, the proof of ergodicity becomes straightforward. Nir adds random qir -bits to all the qir -bits 1

This is a common assumption whenever proving specific properties of iterated cryptographic schemes. Round keys are generally supposed to be random and independent.

200

J. Scharinger

of y  yielding a random value for the new y-coordinate in one step. Cyclically shifting the least significant position of the y-coordinate to the least significant position in the x-coordinate and shifting these random qir -bits towards more significant positions in the x-coordinate ensures that after at most an additional r maxki=1 tir ≤ m iterations the transformed point can move to almost any other position in state space with equal probability. Thus ergodicity is achieved after at most m + 1 iterations. Now let us pay attention to the constraint Nir ≤ x. A moment of thought reveals that the worst non-trivial point that will need the largest number of rounds until being able to move to any position has a x-coordinate of 0 and a y-coordinate where just y1r is different from zero. Then it takes at most m + 1 iterations until the second-least significant qir -bit in the x-coordinate is set and the least significant qir -bit in Nir (and also in the x-coordinate!) may assume any random value. By shifting qir -bits towards more significant positions in the x-coordinate every iteration causes one additional position in x to become random and by adding Nir the same applies to the y-coordinate. This way it is guaranteed that after another at most m − 1 iterations ergodicity is achieved after at most 2m steps in total. The preceding discussion can be summarized as follows: Theorem 1. Let the side-length n = pm be given as integral power of a prime p. Then the discrete Kolmogorov system Tn,δr as defined in equation 2 is ergodic provided that at least 2m iterations are performed and lists δr used in every step r are chosen independently and at random. In the discussion above we have noted that the restriction Nir ≤ x to observe in every step significantly increases the number of iterations necessary until an initial point can move to any other position. Particularly points with small (zero) x-coordinate need a long time until exhibiting ergodic behaviour. However, a simple trick can help a lot in reducing the number of iterations necessary to achieve ergodicity of the underlying system: after every discrete Kolmogorov permutation round just apply a cyclic shift by n2 − 1 to the elements in the n × n array. This corresponds to adding n2 − 1 modulo n to every x-coordinate and helps points with initially small x-coordinates to move to any other position in a reduced number of rounds. Additionally this simple trick also solves the problems associated with the fixed points (0, 0) and (n − 1, n − 1) so that not just almost all points can move to almost any position but really all of the n × n points will have ergodic behaviour. Exponential Divergence Exponential divergence is essential for a system that is to be applied in cryptography because it stands as a synonym for diffusion. Informally speaking and expressed in terms of permutation systems, exponential divergence implies that neighboring points contained in the same subspace of the state space (e.g. points of the same vertical strip corresponding to the same block of the defining partition) diverge at an exponential rate. This way even highly correlated points in input blocks will quickly loose correlations and structures present in input data will soon disappear.

Construction of Data Dependent Chaotic Permutation Hashes

201

Using similar arguments as applied in proving ergodicity of discrete Kolmogorv systems we have derived the the following theorem: Theorem 2. Let the side-length n = pm be given as integral power of a prime p. Then the discrete Kolmogorov system Tn,δr as defined in equation 2 exhibits exponential divergence of points contained in the same blocks defined by partitions δr ensuring that after at most 2m − 1 iterations arbitrary non-zero deviations between initial points have propagated at least once to the most significant position in the x-coordinate. Mixing Property The mixing property is important for a system that is to be applied in cryptography because it stands as a synonym for confusion as well as diffusion. Informally speaking and expressed in terms of permutation systems, fulfillment of the mixing property implies that any subspace of the state space will dissipate uniformly over the whole state space. Obviously this is an even stronger requirement than ergodicity because it does not only imply that almost any point will move to almost any position in state space with equal probability but also that distances between neighboring points within certain subspaces will become random as the system evolves in time. Combining results derived in proving ergodicity and exponential divergence of discrete Kolmogorv systems, we have shown the following theorem: Theorem 3. Let the side-length n = pm be given as integral power of a prime p. Then the discrete Kolmogorov system Tn,δr as defined in equation 2 is mixing provided that at least 4m iterations are performed and lists δr used in every step r are chosen independently and at random. 2.4

Conclusion

Summarizing the preceding discussion, a simple law on the number of rounds necessary to ensure that all the essential cryptographic properties of discrete Kolmogorov systems are fulfilled can be stated as follows: Theorem 4. Let the side-length n = pm be given as integral power of a prime p. Then the discrete Kolmogorov system Tn,δr as defined in equation 2 fulfills the properties of ergodicity, exponential divergence and mixing provided that at least 4m iterations are performed and lists δr used in every step r are chosen independently and at random. Equipped with this solid knowledge it will be shown in the remainder of this contribution that discrete Kolmogorov systems can successfully be applied to develop strong and efficient hash functions to ensure communications integrity.

3

Permutation Hashes Based on Chaotic Kolmogorov Systems

To provide integrity and authenticity in secure communications applications at reasonable computational costs, efficient and strong cryptographic hash func-

202

J. Scharinger

tions are needed. Our approach to compute a message digest based on discrete chaotic Kolmogorov systems runs as follows. First a 16 × 16 square array of bits is initialized with 256 pseudo-random bits (128 zeros, 128 ones) taken from the binary expansion of some √after-comma √ “magic” constants (π, e, golden ratio φ, 2, 5, etc.) as done in almost any cryptographic hash function. Taken line-by-line or column-by-column, this provides the initial 256 bit message digest M D0 . After initialization, in every step t = 1, 2, . . . the message digest M Dt−1 is updated by processing the message in blocks Wt of 256 bit each. Since message lengths are usually not a multiple of 256, padding the last block with arbitrary constant bits may be necessary. Now these 256 message bits are XORed with the current 256 bit message digest to obtain Xt = Wt ⊕ M Dt−1 . This step ensures that any block contains approximately an equal number of zeros and ones, regardless of the message block (which could be entirely zero etc.). To maximize input avalanche effects, the 8 32-bit words Xt (i) (0 ≤ i ≤ 7) are processed according to a linear recurrence relation. First a forward dissipation step is done according to Yt (0) = Xt (0), Yt (i) = aYt (i − 1) + b mod 232 ⊕ Xt (i) with parameters a and b set accordingly (see e.g. [9] for a large variety of suitable parameter settings) to give pseudo-random sequences Yt (i). This is followed by a backward dissipation step (with index i decreasing) according to Zt (7) = Yt (7), Zt (i) = aZt (i + 1) + b mod 232 ⊕ Yt (i). After preprocessing the message block Wt to obtain the block Zt , the actual hashing step takes place. The 256 bit of Zt are used to provide 32 key bytes Zt (i, j) (0 ≤ i ≤ 7, 0 ≤ j ≤ 3) to permute the message digest M Dt−1 stored in the 16 × 16 array of bits using the corresponding discrete Kolmogorov system. For several reasons2 , a cyclic shift by 7 positions follows each of the 32 rounds involved in calculating the updated message digest M Dt . Figure 2 summarizes one round when calculating data dependent chaotic permutation hashes based on chaotic Kolmogorov systems. Iterating this procedure for all blocks of the input message and finally reading the 16 × 16 2D array line-by-line or column-by-column delivers the 256 bit message digest of the message to hash in a very efficient and elegant manner as pseudo-random message-dependent permutation of the initial message digest M D0 .

4

Security Analysis

Informally speaking, a message digest scheme is called secure, if it is computationally infeasible to find a message which corresponds to a given message digest, or to find two different messages which produce the same message digest. 2

It has been shown that fulfillment of essential cryptographic properties by discrete Kolmogorov systems with side length n needs iteration of at least 4∗log2 n steps. This property can be achieved in less steps (see arguments given in proving ergodicity), if each iteration is followed by a cyclic shift by n2 − 1 positions. Additionally this resolves problems related to fixed points (0, 0) and (n − 1, n − 1).

Construction of Data Dependent Chaotic Permutation Hashes

203

Wt Xt = Wt XOR MDt-1 32

Yt(0) = Xt(0); Yt(i) = aYt(i-1)+b MOD 2

32

Zt(7) = Yt(7); Zt(i) = aZt(i+1)+b MOD 2 Zt(0,0)

MDt-1

T16, (Zt(0,0)) Cyclic shift (7 positions)

. . . . .

. . . . .

XOR Xt(i) XOR Yt(i) Zt(7,3)

T16, (Zt(7,3)))) Cyclic shift (7 positions)

MDt

Fig. 2. One step in calculating data dependent chaotic permutation hashes based on discrete Kolmogorov systems.

Any change to a message in transit will, with very high probability, result in a different message digest, and the signature will fail to verify. Security of cryptographic hashes calculated from discrete Kolmogorov permutations is extremely well based on the properties given in section 2.3. Additionally, we have done extensive evaluations on the cryptanalytic quality of the data dependent chaotic permutations generated by discrete chaotic Kolmogorov systems with respect to confusion, diffusion and fixed point distribution properties as well as differential and linear characteristics. These quantitative results will be summarized in the sequel. 4.1

Quantitative Security Analysis

Number of Different Message Digests Since any 256 bit message digest generated is a permutation of an initial message digest  having251128 zeros and 128 ones, the number of different message digests is 256 and thus far 128 > 2 beyond the number of particles in our galaxy [14]. Therefore it can be considered extremely unlikely that two different input messages lead to the same message digest. Confusion We have done extensive χ2 -testing to verify the claim that data dependent chaotic permutations generated are uniformly distributed regardless of the initial distribution. Results justify the assumption that the permutations generated are statistically indistinguishable from a uniform distribution, a result expected due to the mixing property associated with any chaotic Kolmogorov system.

204

J. Scharinger

Diffusion We demand that even for very similar messages completely different permutations will be generated. Checking average diffusion distances the diffusion distances observed rapidly converge to the optimum diffusion distance expected for completely un-correlated permutations. Singleton Cycles Distribution Suppose we are given a list of n elements, the resulting n! permutations can be listed according to the number of singleton cycles in groups with no fixed element, one fixed element, two fixed elements, ..., all n elements fixed. Assuming that n tends to infinity the probability pk that a 1 random permutation has exactly k fixed elements is pk = ek! . It was stunning how close the singleton cycles distributions observed matched the distribution expected for a random permutation. Therefore there was no evidence that permutations generated have a singleton cycles distribution significantly different from a random permutation. Differential Analysis Differential cryptanalysis [2] analyzes the effect of particular differences in input pairs on the differences of the resultant output pairs. In the ideal case of a random permutation of 256 elements the most likely non1 trivial differential characteristic has a probability of 255 . Deducing from our experiments we claim that the most likely differential characteristic observed rapidly converges to that optimum value. Linear Analysis Linear cryptanalysis [5] studies linear relations between bits of inputs and corresponding outputs. When deriving linear relations one chooses a subset of the input bits and the output bits, calculates the parity (XOR) of these bits for each of the possible inputs and counts the number of inputs whose subset’s parity is zero. Ideally this number does not differ from half at all. Deducing from our experiments it can be assumed that all non-trivial linear characteristics have a probability rapidly converging to the the optimum value ( 21 ± 0) that can be expected for random permutations.

5

Conclusion

Concepts for generating strong digital fingerprints are essential components for ensuring integrity and authenticity in secure communications applications. In this contribution we have introduced a novel approach for generating cryptographic hashes (digital fingerprints) that can be characterized as follows: – Efficiency: Time-consuming operations (multiplications) are only needed in preprocessing the input block. Implementation of the chaotic permutations can be made extremely fast. Since all stretching and squeezing factors are restricted to be integral powers of 2, all the operations involved in computing a new position for points in the array can be done by just using additions, subtractions and bit shifts.

Construction of Data Dependent Chaotic Permutation Hashes

205

– Security: Permutation hashes generated fulfill all requirements essential for secure hashes. There is an enormous number of different fingerprints and permutations generated are indistinguishable from random permutations with respect to confusion, diffusion and fixed point distribution as well as differential and linear characteristics. Note that this observation is perfectly in line with the proven cryptanalytic properties of chaotic Kolmogorov systems (ergodic, mixing, exponential divergence). These arguments clearly emphasize that data dependent chaotic Kolmogorov permutation hashes can offer an excellent choice when strong and efficient hash functions are needed in secure communications.

References 1. V.I. Arnold and A. Avez. Ergodic Problems of Classical Mechanics. W.A. Benjamin, New York, 1968. 2. Eli Biham and Adi Shamir. Di erential cryptanalysis of DES-like cryptosystems. In Advances in Cryptology { CRYPTO'90 Proceedings, pages 2{21. Springer Verlag, 1991. 3. W. DiÆe and M.E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644{654, 1976. 4. S. Goldstein, B. Misra, and M. Courbage. On intrinsic randomness of dynamical systems. Journal of Statistical Physics, 25(1):111{126, 1981. 5. Mitsuru Matsui. Linear cryptanalysis method for DES cipher. In Advances in Cryptology { Eurocrypt'93 Proceedings, pages 386{397. Springer Verlag, 1993. 6. Jurgen Moser. Stable and Random Motions in Dynamical Systems. Princeton University Press, Princeton, 1973. 7. US Department of Commerce/NIST. Secure hash standard. FIPS PUB 180-1, April 1995. 8. National Institute of Standards and Technology. Digital signature standard. U. S. Department of Commerce, 1994. 9. W.H. Press, B.P. Flannery, S.A. Teukolsky, and W.T. Vetterling. Numerical Recipies in C: The Art of Scienti c Computing. Cambridge University Press, 1988. 10. RACE (Research and Development in Advanced Communication Technologies in Europe). RIPE Integrity Primitives. Final Report of RACE Integrity Primitves Evaluation, 1992. 11. R.L. Rivest. The MD5 message digest function. RFC 1321, 1992. 12. R.L. Rivest, A. Shamir, and L.M. Adleman. A method for obtaining digital signatures and public-key cryptsystems. Communications of the ACM, 21(2):120{128, 1978. 13. Josef Scharinger. Fast encryption of image data using chaotic Kolmogorov ows. Journal of Electronic Imaging, 7(2):318{325, 1998. 14. Bruce Schneier. Applied Cryptography. Addison-Wesley, 1996. 15. Paul Shields. The Theory of Bernoulli Shifts. The University of Chicago Press, Chicago, 1973.

Secure Communication: A New Application for Active Networks Manuel G¨ unter, Marc Brogle, and Torsten Braun Institute of Computer Science and Applied Mathematics (IAM), University of Berne, Neubr¨ uckstrasse 10, CH-3012 Bern, Switzerland http://www.iam.unibe.ch/˜rvs/ Abstract. SplitPath is a new application for the easy, well-known and provably secure one-time pad encryption scheme. Two problems hinder the one-time pad scheme from being applied in the area of secure data communication: the random generation and the distribution of this random data. SplitPath exploits the flexibility of code mobility in active networks to address these problems. Especially the random generation is studied in more detail.

1

Introduction

A wide variety of encryption algorithms is in daily use to protect data communications. However, none of these algorithms is proven to be secure. A well-known algorithm exists which is very simple and perfectly secure: the one-time pad [Sch96]. It works as follows: Assume you want to encrypt a bit string P of n bits (P, pi ∈ {0, 1}, i ∈ 1..n). For that purpose you take a string of equally distributed and independent random bits R, ri ∈ {0, 1}, i ∈ 1..n and xor (addition modulo 2) it bit-wise with P , resulting in the ciphertext C, ci = ri ⊕ pi . To decrypt C, R is xor-ed to C again. This works because ri ⊕ (ri ⊕ pi ) = pi . R must be destroyed after the decryption. It is assumed that once R is generated, it is used for encryption and decryption only once. That’s why the scheme is called one-time pad. Under these assumptions the algorithm is provably secure. It is impossible to gain any knowledge of P without knowing R, because every possible plaintext could have lead to a given ciphertext. Furthermore, in contrary to commercial encryption algorithms, the one-time pad needs only one very light-weight operation (xor) for encryption and decryption. However, the one-time pad is not practical for secure data communication for the following reasons: – Lack of random bits. The one-time pad needs a irreproducible random bit-stream (R) of the same length as the message. – Ensuring single usage. The receiver and the sender must both exclusively possess the same pad (R). How can the pad securely be established by the communication partners? This paper presents an approach using active networking [CBZS98,TSS+ 97] to address both problems. An active network consists of active (programmable) network nodes. The data packets that are transmitted through an active network P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 206–216, 2001. c Springer-Verlag Berlin Heidelberg 2001 

Secure Communication: A New Application for Active Networks

207

can contain code that the active nodes execute. Active networking is an instance of the mobile agents paradigm tailored to networking needs. Active network packets (also called capsules) access the networking functionalities of the nodes (e.g. forwarding and routing) and change these functionalities for packets or classes of packets. This paper presents how (for a given application scenario) active networking enables us to use the one-time pad with its provable security and lightness for secure data communication. In section 2 we present the basic idea how to address the distribution of the random (problem 2). Section 3 describes how to generate the necessary random (problem 1) and what the pitfalls are. An existing implementation using the wellknown active networking tool ANTS [WGT98] is presented in section 4. Section 5 presents performance measurements and section 6 concludes the paper.

2

Distribution of Keys and Data

We said that with enough good random bits available, we can create an uncrackable bit stream using the one-time pad. However, the receiver must also possess the random bits. A straight-forward solution is to first deliver the random bits in a secure manner and later transmit the data. The sender could, for example, hand a magnetic storage tape to the receiver, containing the random bits. This is a secure but not very flexible application of the one-time pad. The use of a secure communication medium1 allows the communicating parties to communicate later using an insecure communication medium. But even if the medium for sending the random is not secure, the scheme still works as long as no attacker has access to both random and message bits. This principle is e.g. used when encryption keys for data communication are exchanged using the postal service or the telephone system. The SplitPath idea goes one step further. The random bits (interpreted as the key) and the cipher text bits (plaintext xor-ed with the random bits) are sent along at the same time on the same media but on different paths. In general this scenario is not secure any more, since an attacker can eavesdrop both the random string and the encrypted message and thus easily decrypt the original message. In a network with centralised management at least the network provider will always be able to do this. However, if the network is partitioned in autonomous sub-networks (domains), as for example the Internet is, and if the two paths are entirely in different domains, an attacker will have significantly more trouble. Thus, the application of SplitPath requires the following preconditions: – SplitPath traffic enters the untrusted networks only in split form (either random bits or xor-bits). – The paths of corresponding random bits and xor-bits never share the same distrusted network. – The distrusted networks do not trust each other. 1

Assuming that the physical delivery of the magnetic tape is secure.

208

M. G¨ unter, M. Brogle and T. Braun

These preconditions limit the application scenario of SplitPath, but there are cases where the prerequisites are met. – Multi-homing. Today’s Internet service providers (ISP) compete with each other. Most of the larger ones own their own physical network infrastructure. It is not uncommon that customer networks are connected to more than one ISP. – Heterogeneous and redundant network technology. A modern global data network like the Internet consists of all kinds of different network technologies (e.g. optical networks and satellite links) running different link layer protocols (ATM, Frame Relay etc.). These link layer networks are usually inter-connected on many redundant links. – International tension. Unfortunately, many neighbouring countries tend to be suspicious about each other. The geographical location of-, and the relation between some nations can provide an ideal application scenario for the SplitPath scheme. The generic situation is depicted in figure 1. At the split point the data packet is split into a random packet (the pad) and the xor result of data and pad. The resulting packets are sent along disjunct network paths. When they arrive in the trusted receiver network (at the merge point) then they are merged back into the original data packet.

111 000 000 111 111 000 000 111

Manuel H. Guenter

Split point

11 00 00 11 00 11 Trusted subnet

Distrusted networks

11 00 00 11 00 11

Distrust

Merge point

11 00 00 11 00 11 Trusted subnet

Manuel H. Guenter

Distrusted networks

111 000 000 111 Pure data packet 000 111 000 111 000 111 000 111 000Random data packet 111

111 000 000Xor data packet 111 Fig. 1. The application scenario for SplitPath.

We distinguish between the sender, the receiver, a split point and a mergepoint. Obviously, the split- and merge point needs to be located on a trustworthy site. Depending on the sender, receiver and the network topology the ideal location of these points varies, thus their implementation cannot be preconfigured in few network nodes. Active networking brings the flexibility we need here. With active networking the data packets can dynamically setup their private split (merge) functionality in the nodes which are appropriate for them. No router configurations are necessary. SplitPath capsules contain code that dynamically

Secure Communication: A New Application for Active Networks

209

implements the split and merge capabilities and controls the routing of the packets. These mechanisms are described in section 4. The next section shows how active networking can also help us getting the ‘good’ random bits which are needed in the split point.

3

Generating Random

For SplitPath, like for most crypto-systems, the availability of high quality random material is crucial. The random bits must be independent and equally distributed in order to be unpredictable. However, it is not easy to acquire such random in a computing environment. Irreproducible random values can solely be created by real world interaction. Examples are: mechanical random devices (e.g. lottery machines, dices), physical random (e.g. radioactive decay) and human behaviour (e.g. keyboard interrupt times). Multiprocessing and networking devices can also be a source of random bits [Wob98]. In SplitPath, we propose to use unpredictable traffic characteristics as seen in networking devices and generate random bits with them. Active networking allows the capsule to use its own varying queueing times within the network. The capsule, being autonomous, can keep information about its creation time and ask the nodes on its way about the local time. Note, that clock skew is actually good for the random generation because it introduces another factor of incertitude. The idea is that by travelling through the net each capsule generates random bits for its own use. However, e.g. an IP packet can contain 64 KBytes of data. It needs the same amount of random bits for applying the one-time pad. 3.1

Quantity and Quality of SplitPath Random

The quantity of random bits gained by network performance measurement is limited. This is a problem but we have many options to cope with the situation: 1) Limit the payload of the capsule. Programmable capsules can fragment themselves to smaller payload sizes. This produces more packets and thus more random data per payload byte. It also adds bandwidth overhead. Note however, that congestion eases the production of random bits, since it involves a lot of non-predictable behaviour (see also section 5). 2) Generate more random bits by sending empty packets. When capsules can store data in nodes (see section 4) then we can use the idle time to send empty capsules that store their performance statistics in the split-node. Later, when payload is transported, the capsule can use the stored information to generate random. 3) Multi-hop random generation. If the capsule executes at several nodes before the split node, it can calculate its performance statistics there, too. The capsule takes the gained random bits with it and uses them at the split node. Care must be taken when distilling random bits from several nodes, because they are probably not completely independent.

210

M. G¨ unter, M. Brogle and T. Braun

These options do not affect the strength of the one-time pad, but they limit the effective throughput of data. Another approach is to use a pseudo-random function [Sch96]. This function uses the collected random data as a seed and generates a bit sequence of arbitrary length that can be used to xor the data. However, the next paragraph explains why such ‘stretching’ of the random bits affects the perfect security of the one-time pad. When an attacker tries to decrypt an unknown ciphertext the most straightforward thing to do is to decrypt the message with every key and see if the result looks like a meaningful message. This is also called a brute-force attack. The onetime pad is immune against such attacks, because in his search through the key space the attacker will find every meaningful message that can be encoded in that length. However, once we start expanding the random key string by using it as a seed to a pseudo-random function, we will loose this nice property of the one-time pad. Based on Shannon’s communication theory of secrecy systems, Hellman [Hel77] showed that the expected number P of different keys that will decipher a ciphertext message to some intelligible plaintext of length n (in the same language as the original plaintext) is given by the following formula: P = 2H(K)−nD − 1. P indicates the success probability of the brute-force attack. If P is small then the brute-force attack will deliver only few possible plaintexts, ideally only one, which then can be assumed to be the original message. H(K) is the entropy of the crypto-system used and D is the entropy of the encoded language. Using this formula we can show [GBB00] that for ASCII encoded English text each payload byte should be protected by at least 7 random bits. This is a very small stretching factor of 8/7. Random Expansion in Practice. When we want to ‘stretch’ the random data by larger factors we can not rely any more on the perfect secrecy of the one-time pad. Instead, we have to carefully design the pseudo-random generator. First of all, the seed length must be large. We propose 128 bits. While the previous paragraph showed that a brute attack in principle will lead to the decryption of the packets (in the worst case there is only one random bit per packet), in practice the attack will not be successful, because there are too many bit combinations to try (an average of 2127 ). If a million computers would each apply a billion decryption tries per second the average search would still last about 5*1015 years. Second, the pseudo random generator should resist cryptanalysis. Many such generators exist and are used for so-called stream ciphers [Sch96]. Using SplitPath with expanded random is very similar to using a stream cipher in that both xor the plaintext with a secure pseudo random bit stream. However, SplitPath differs from stream ciphers in that it uses the pseudo random generator only at the sender side. Furthermore, the flexibility of an active network platform allows SplitPath to dynamically change the generator used, even during an ongoing communication. Finally, the seed of the generator is updated frequently (as soon as enough random bits have been collected by the capsules), and the seed is random. This is different from e.g. the stream cipher A5 (used for mobile telephony) which uses a preconfigured seed.

Secure Communication: A New Application for Active Networks

4 4.1

211

Implementing SplitPath in an Active Network Implementing SplitPath with the Active Node Transfer System ANTS

We implemented the SplitPath application using the active node transfer system ANTS [WGT98]. ANTS is a Java based toolkit for setting up active networking testbeds. ANTS defines active nodes, which are Java programs possibly running on different machines. The nodes execute ANTS capsules and forward them over TCP/IP. ANTS defines a Java class Capsule. The class contains the method evaluate which is called each time the capsule arrives at a node. New capsule classes can implement new behaviour by overriding the evaluate method. The node offers services to the capsule such as the local time, forwarding of the capsule and a private soft-state object store (called node cache). Collaborating capsules can be grouped to protocols. Capsules of the same protocol can leave messages for each other using the node cache. We defined such a protocol to implement the SplitPath concept as presented in section 2 by introducing three new capsule subclasses. 1) The Pathfinder capsule marks nodes as splitting or merging points and sets up the split paths using the node caches. Note that several split and merge points can be set up per communication. Currently, Pathfinders are parametrised and sent by applications. We foresee to implement them with autonomous intelligence. 2) The Normal capsule is the plaintext message carrier. It checks if it is on a splitting point. If not, it normally forwards itself towards the destination. If it is on a splitting point, it applies the one-time pad computation to its payload. This results in two Splitted capsules, one carrying the random bits, the other the xor-ed data in the payload. The Normal capsule tells the node to forward the two newly produced Splitted capsules instead of itself, thereby using the information that was setup by the Pathfinder. 3) The Splitted capsule carries the encrypted- or the random data along a separate path. It forwards itself using the information that was setup by the Pathfinder. It checks if it has arrived on a merge point. If so, it checks if its split twin has already arrived. In that case it xor-s their contents (decryption) and creates a Normal capsule out of the result. If the twin is not there, it stores itself on the node cache to wait for it. Applications and Interfaces. We wrote two applications that send and interact with the implemented capsules. The first application provides a graphical interface which allows the user to dynamically set up split and merge points using the Pathfinder. Furthermore, the user can enter and send text data using the Normal capsule. We also extended the nodes with a sniffing functionality. Such ‘spy nodes’ log capsule data to validate and visualise the SplitPath encryption. We implemented a second application which transfers a file (optionally several times) in order to test the performance by generating load.

212

4.2

M. G¨ unter, M. Brogle and T. Braun

Random Generation and the Application of the One-Time Pad

In order to be able to send large packets, we decided to use pseudo random generators to extend the collected random bits (see section 3). Each Normal capsule contains its creation time. When arriving at a split node, it uses this time and the node’s current time to calculate the delay it has so far. It stores the last few bits as random seed. The number of bits is configurable and depends on the clock resolution. Unfortunately, the Java system clock resolution used by ANTS is bound to one millisecond and the delay is in the order of few milliseconds. Therefore, we used only the least significant bit. Thus, every packet stores one random bit in the split node (using the node cache). This bit can be considered as random, since it is influenced by the speed and current usage of computing and networking resources. As said before, the chosen seed length is 128 bits. So for every 128th capsule a complete seed is available. This capsule uses the seed to store a new random generator in the node cache. The next capsules use the generator for their encryption, until enough fresh random has been collected to install a generator with the new seed (key refreshing). For the bootstrapping we foresee two schemes. Either 128 empty packets are sent, or a (less secure) seed is used that can be generated by the first packet. We have implemented two random generators. The first one is based on the secure one-way hash function MD52 . The seed is stored in a byte array of 16 bytes. Furthermore, there is an output buffer of 16 bytes containing the MD5 hash value of the seed buffer. The generator delivers 8 bytes of the output buffer as pseudo-random values. Then, the seed is transformed and the output buffer is updated (MD5 hash). The ‘one-way’ property of MD5 assures that an attacker cannot reconstruct the seed. Thanks to the avalanche property of MD5 the transformed seed produces an entirely different hash. Our seed transformation is equivalent to the increment of a long integer (8 bytes) by one. Thus, the seed only repeats after 264 transformations. Long before that, SplitPath will replace the seed with freshly gathered random values. We think that for the presented reasons this pseudo random generator is reasonably secure. Nevertheless, we implemented also the pseudo random generator of RC4 as an alternative. RC4 is a stream cipher developed by RSADSI. It is used in applications of e.g. Lotus, Oracle and Netscape (for details see [Wob98]).

5

Evaluation of SplitPath

In order to evaluate SplitPath we ran the implementation on our institute network. Six ANTS nodes were set up on six different machines (sender, receiver, a split and a merge node and two sniffers; see figure 2). The split node ran on a SPARCstation 5/170. The encrypted capsules ran over two different subnets and were merged in a machine of a third subnet. The subnets are 100 Mbps Ethernets. We used the aforementioned file transfer application to generate load. Our 2

ANTS includes the Message Digest 5 (MD5) [IETF RFC 1321] functionality.

Secure Communication: A New Application for Active Networks

213

interest was focussed on the quality of the encryption. We measured this by collecting all generated seeds and apply statistical tests. Furthermore, we applied statistical tests to the MD5 pseudo random generator presented in the previous section.

Split point

Merge point Sniffer Distrusted subnet

Trusted subnet

Trusted subnet Manuel H. Guenter

Sender

Sniffer Distrusted subnet

Manuel H. Guenter

Receiver

Fig. 2. The network topology for the evaluation.

In order to test the quality of the MD5 random generator, we initialised it with all seed bytes set to zero. Then we fed its output into a framework for statistical tests. Testing with samples of 40 MByte size, the produced data succeeded the byte frequency test, the run test [Knu81] and the Anderson-Darling test [IETF RFC 2330]. This is no prove that the generated pseudo-random bits are of high quality, but it shows that they are not flawed. Seed Generation. We evaluated the generated seed bytes using statistical tests. For example we analysed 3K seed bytes (192 complete seeds, protecting 24576 packets). The seeds pass the byte frequency test (χ2 test on the distribution of the measured byte values [Knu81]). Unfortunately, in few cases we also experienced seed generation that was not uniformly distributed. There we see some concentrations of byte values especially around the value 0. Our investigation revealed three reasons that come together to form this effect. (1) The coarse resolution of Java’s clock. (2) ANTS does not send one capsule per packet, and the packet code is not send within the capsule, but dynamically loaded and cached. Thus, consecutive capsules are handled immediately after each other without delaying I/O operations. (3) The local network used has very low delay and jitter. These problems are not discouraging because normally they do not all come together and there are also countermeasures. By introducing congestion we can show that given realistic wide area delays as studied e.g. for the Internet [EM99], the seeds are equally distributed. Figures 5 and 3 show the seeds of two samples. Each sample shows the single byte values (2-complement) in the

214

M. G¨ unter, M. Brogle and T. Braun Value of generated seed bytes

100

Seed byte value

50

0

-50

-100

0

200

400

600

800

1000

1200

Bytes

Fig. 3. Biased seed. Value of generated seed bytes

100

Seed byte value

50

0

-50

-100

0

500

1000

1500 Bytes

Fig. 4. Good seed.

2000

2500

1400

Secure Communication: A New Application for Active Networks

215

same order as they were created. Figure 5 represents a sample suffering of the previously mentioned problems, figure 3 represents a corrected sample. There are many more options to improve the seed quality. Additional use of other random sources for example. We foresee the exploitation of additional sources offered by active networking e.g. execution times of capsules or properties of the node cache. Finally, we can once again exploit the fact that the capsules are programmable. The procedure for collecting seed values can easily be extended to contain statistical methods to test the seed before it is used. So if for some unforeseen reason the seed is not good enough, the capsule uses the old random generator a little longer until more random bits are collected. Also, methods described in [Sch96] can be used by the capsule to distill random from biased random bits.

6

Conclusion

We presented SplitPath, a new application for the well-known and provably secure one-time pad encryption scheme. SplitPath uses the ability of active networks and the trust relations in heterogeneous networks to solve the two problems which otherwise render the one-time pad scheme useless: the random generation and the distribution of this random data. SplitPath can dynamically set up and use disjunct paths through network domains that do not collaborate, such as competitive network providers or countries. One-time pad encrypted data and random data is forwarded separately on these paths. Active networking allows SplitPath to encrypt and decrypt at any trusted node. Active networking not only allows SplitPath to dynamically set up the one-time pad splitting inside of the network, it also helps to collect good random. This can be very useful for other crypto-systems, too. SplitPath implements data capsules that use the network delays that they experience as initialisation for the random generation. With SplitPath we present an application in a (albeit specific) environment which cannot be implemented using conventional ‘passive’ networking, thus we promote the future study and (hopefully) deployment of active networking.

References CBZS98. K. Calvert, S. Bhattacharjee, E. Zegura, and J. Sterbenz. Directions in active networks. IEEE Communications, 36(10), October 1998. EM99. Tamas Elteto and Sandor Molnar . On the distribution of round-trip delays in TCP/IP Networks. In Proceedings of the 24th Conference on Local Computer Networks LCN’99, pages p.172–181. IEEE Computer Society, October 1999. GBB00. M. G¨ unter, M. Brogle, and T. Braun. Secure communication with active networks. Technical Report IAM-00-007, IAM, 2000. www.iam.unibe.ch/∼rvs/publications/. Hel77. M. E. Hellman. An extension to the shannon theory approach to cryptography. IEEE Transactions on Information Theory, IT -23(3):p. 289–294, May 1977.

216 Knu81.

M. G¨ unter, M. Brogle and T. Braun

D. E. Knuth. The art of computer programming, volume 2 Seminumerical Algorithms. Addison-Wesley, 2 edition, 1981. Sch96. B. Schneier. Applied Cryptography. John Wiley and Son, 1996. TSS+ 97. D. L. Tennenhouse, J. M. Smith, W. D. Sincoskie, D. J. Wetherall, and G. J. Minden. A survey of active network research. IEEE Communications Magazine, 35(1):80–86, January 1997. WGT98. D. Wetherall, J. Guttag, and D. L. Tennenhouse. ANTS: A toolkit for building and dynamically deploying network protocols. In IEEE OPENARCH ’98, April 1998. San Francisco. Wob98. Reinhard Wobst. Abenteuer Kryptologie. Addison-Wesley, 1998.

Deployment of Public-Key Infrastructure in Wireless Data Networks Arun K. Singh E-Commerce Research Labs., Infosys Technologies Limited, Electronic City, Bangalore, India [email protected]

Abstract. Over the last decade there has been a rapid growth in the area of wireless applications. For a wireless application to be successful, it is essential to ensure that the transactions cannot be fraudulently generated, that transactions are legally binding, and that the confidentiality of private information is adequately protected. Such assurance depends upon deployment of public-key infrastructure (PKI) technology in wireless data networks. When wireless devices are used for data communication, they have to face many environmental limitations e.g. limited computing power in wireless devices, inadequate memory space, low network bandwidth and restriction imposed by underlying communication protocols and services. This obviously creates further challenges for protocol designers, implementers and standardization body. This paper discusses the issues involved in implementing PKI in wireless data networks and possible approaches to resolve them. It also provides an overview of today’s mobile system environment and current status of wireless security implementations.

1 Introduction Wireless applications are changing the face of the Internet world. It is possible to use digital phones, PDAs, and pagers to access many commercial applications such as mobile banking, brokerage, and retailing. The emerging technology behind this is based on the Wireless Application Protocol (WAP). In order to exploit the potential of wireless Internet market, handset manufacturers such as Nokia, Ericsson, Motorola, and others have developed WAP-enabled smart phones. Using Bluetooth technology, smart phones can offer many services e.g. fax, e-mail, and phone capabilities in a single device. This is paving the way for wireless Internet applications to be accepted by ever-increasing mobile workforce. Industry estimates indicate that the number of wireless Internet clients will exceed the number of wired PC/Internet clients by 2004. As compared to wired Internet, security concerns are much greater in the wireless network. Addressing these security concerns involve deployment of Public Key Infrastructure (PKI) technology in wireless data networks. PKI contains three common P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 217–224, 2001 © Springer-Verlag Berlin Heidelberg 2001

218

A.K. Singh

functional components: the certificate authority (CA) to issue certificates (in-house or outsourced); a repository for keys, certificates and certificate revocation lists (CRL) on an LDAP-enabled directory service; and a management function, typically implemented via a management console [1], [6]. Additionally, PKI can provide key recovery in case a user loses his/her private key due to hardware failure or other problem []. In this paper, we will discuss the issues involved in deploying PKI technology for a wireless application and list down possible approaches to handle them.

2 The Current Wireless Environment The wireless communication model is very much similar to the Internet model with some subtle differences. As shown in Figure 1, in Internet model the client device – PC or Laptop, uses a modem to get connected to ISP (Internet Service Provider) using PPP (Point-to-Point Protocol). The ISP authenticates the client by using any of the available authentication protocols e.g. PAP (Password Authentication Protocol), CHAP (Challenge Handshake Authentication Protocol), MS-CHAP, MD5-CHAP etc. Once the authentication is successful, it allocates an IP address to the client and provides a direct connectivity to the Internet backbone through a router or the gateway. Once the client device is connected to the Internet, it communicates with the Web Server on the Internet using Hyper Text Transfer Protocol (HTTP) [2]. HTTP

IP over PPP Regular Phone Call

Internet

Telephone Exchange

ISP’s Internet Access Gateway

Web Server on the Internet

Fig.1. Internet Model As compared to Internet model, in wireless model the client is a wireless device such as mobile phone, tablet, personal digital assistant (PDA), webTV, handheld computer and thin client terminals. These instruments have the added capability to support data in addition to voice. The connection is still made via phone call but this time using

Deployment of Public-Key Infrastructure in Wireless Data Networks

219

wireless communication technology such as Cellular digital Packet Data (CDPD), General Packet Radio Service (GPRS) etc.. CDPD and GPRS provide circuit switched and packet switched data services over existing wireless network using Advanced Mobile Phone Services (AMPS) and Global System for Mobile Communication (GSM) respectively [3]. The wireless client devices access the gateway using : -

Same basic protocols as Internet (HTTP/SSL/TCP/IP) e.g iMode Wireless Application Protocol (WAP) e.g. WAP enabled devices Properitery protocols e.g. PDAs and Two way pagers

iMode service is introduced by Tokyo based Mobile Communications Networks Inc. (NTT-DoCoMo) and is very popular with around 7 million user base [13]. WAP standard is defined by WapForum with some of the biggest names in the wireless devices like Motorola, Nokia, Ericsson and others behind it [12]. WAP is set to become the default standard for getting Internet data to cell phones. If the client devices are using iMode, they will connect to the iMode Gateway, which in turn provides connectivity to iMode enabled web servers over the Internet whereas WAP enabled client devices access Web servers on the Internet through WAP gateway.

Wireless Communication Technology

HTTP

Internet Wireless Network Wireless Device

DoCoMo i-mode Center or

Web Server on the Internet

WAP Gateway

Fig. 1. The Wireless Model In the wireless model, Figure 2, it is wireless operator rather than ISP who receives the wireless call and does the client authentication. Once the authentication is done, the wireless operator routes the data over its proprietary network to a Gateway. This gateway converts wireless protocols to http protocol and forwards the packet over Internet to the Web server that serves the wireless device complaint content. As compared to Internet environment, the wireless environment has many limitations. On the client devices, these limitations are in terms of CPU’s capabilities,

220

A.K. Singh

available memory, battery lifetime, and user interface. From the network viewpoint, the available bandwidth is very low and due to internal structure of wireless networks there is a problem of sustained waiting time, called latency. All these constraints combined with different network configurations, business relationships, different wireless network carriers make the deployment of PKI a very challenging task [4]. Providing ordinary PKI services such as authentication of entities, digital signatures, integrity and data privacy in this constrained environment, gives rise to a number of issues.

3 Security in the Wireless Environment On the Internet, security is provided between client and server by using TLS (Transport Layer Security) protocol, which is based on SSL3.0 (Secure Socket Layer). It is not possible to use SSL directly for the wireless networks because of low bandwidth and high latency constraints. For wireless networks, a modified protocol WTLS (Wireless Transport Layer Security), which is based on TLS1.0, is used [2]. WTLS is specifically designed to conduct secure transactions on wireless networks without requiring high processing power and memory in the mobile devices. It does this by minimizing protocol overhead, utilizing better compression techniques, and employing more efficient cryptography, such as RSA (RC5) or ECC (Elliptic Curve Cryptography) [5] & [7]. There are two parts to the WAP security model – first between wireless client device and WAP Gateway and second between Gateway and Internet Web server (Figure 2). Using WTLS protocol in the first part and SSL in the second part, security is provided in the wireless data networks. At WAP gateway, the WML (Wireless Markup Language) data must decrypt and re-encrypt itself as HTML because it is going from WTLS encryption, which supports WML, to SSL, which supports HTML. The WAP gateway works as a bridge between WTLS and SSL security protocols and translates the messages from wireless zone to Internet zone and vice versa. The presence of gateway brings a serious security issues in the wireless environment. If one can access the gateway, he/she can intercept the decrypted traffic before it is rescrambled. This is called two-zone wireless security problem [8]. Suppliers of WAP gateway and network operators take every possible measure to keep the gateway as secure as possible. Between gateway and Internet web server, there are no issues because TLS can be used exactly in the same manner as in Internet to provide security. As compared to WAP, iMode system uses compact HTML, which allows iMode enabled wireless devices to talk directly to the Web servers using SSL protocols. Due to this two-zone security problem is not there in iMode systems. In WAP, this problem is supposed to be fixed in the next version.

Deployment of Public-Key Infrastructure in Wireless Data Networks

221

4 PKI Deployment Issues WTLS and SSL simply provide a secure tunnel between two points. Deployment of PKI in the wireless environment using these protocols gives rise to the following important issues: a) b) c) d) e) f)

Public Key Algorithm Selection Key Pair Generation Storage of Private Key and Certificates Certificate Management PKI Interoperability Mobile Device Problems

4.1 Public Key Algorithm Selection The first issue in PKI deployment is to decide about which class of crypto systems are to be used for key generation There are many cryptographic algorithms available e.g. RSA, DSA, ECC, NTRU etc.[5], [6], [7] & [14]. Selection of one of these algorithms depends on many factors such as speed, ease of implementation and public acceptance. In the Internet environment, PKI technology is almost exclusively based on RSA cryptosystem but in wireless world a newer, alternative cryptographic technology called Elliptic Curve Cryptography (ECC) is becoming popular. ECC can perform same basic function as RSA but with fewer CPU resources and smaller Key size. This makes signatures computationally inexpensive. Deployment of PKI with ECC has the main disadvantage that it is not widely deployed and there is a little support in standard Internet protocols e.g. TLS/SSL, S/MIME etc. Due to this, it may not be possible to leverage the installed technology. 4.2 Key Pair Generation The next important issue in PKI deployment in wireless environment is to authenticate unknown parties and establish trust. For this, a separate pair of keys needs to be generated for client as well as for server. On the server side, key-pair generation has no issue but on the client side due to limited device capability it is a big question. The main issue is to decide that who is generating the key-pair for the wireless client device? Whether it is the telecom operator or mobile device manufacturer or the subscriber himself? The security of PKI system relies on the secrecy of the private key. Whosoever generates the key-pair, he/she gets to know the private key and then nonrepudiation can be guaranteed to that party only. Once the keys are generated, then there are some related issues e.g. who is installing these keys in the mobile devices? Also after the key installation we have to bother about how to update these trusted keys?

222

A.K. Singh

The approach to handle this key-pair generation issue depends on the trust relationship. If the subscriber trusts on telecom operator or handset manufacturer, then he/she can ask them to generate key-pair on their behalf. Generally the credit card issuers are interested in how the authentication solution they deploy is stored and used, particularly if they are financially responsible for its misuse. As a result there is an anticipated desire for issuers of their trusted agents to directly manage services such as server-based wallets, just as they closely manage the issuance of their chip cards. In server-based wallets there is no need to install private keys on the handsets otherwise, subscribers can obtain the private keys from issuers and install them on their mobile phones. 4.3 Storage of Private Key and Certificates Private key and certificates can be stored in the software or in the hardware. From security viewpoint, storing the keys in hardware makes it tamper proof but then the key management becomes difficult. On the other hand, storing the key in software makes key management easy but replacement of phones may result in temporary loss of identities. Along with this there is an associated issue that who is responsible for installing these keys? The current practice of key storage in mobile network is based on hardware smart cards. Telecom service provider or handset manufacturer can issue the card. In GSM world, SIM (Subscriber Identification Module) card is used whereas in WAP world, an equivalent WIM (Wireless Identification Module) card is used. These cards provide an excellent tamper resistant storage place for private/public keys and provide mobility to the personal credential. The new WIM cards are equipped with crypto processing power and they will allow users to digitally sign the message [9]. The main problem in using these new cards is posed by the wireless bandwidth. The available bandwidth is not capable of delivering strong encryption and we have to wait till 3G, the third generation wireless bandwidth. For key installation, subscribers can install their private keys either themselves or by the card issuer. The telecom operator can install trusted certificates of CAs on these cards before selling the mobile devices. Alternatively, manufacturers of handsets may install trusted certificates in the handset directly. Apart from this, at present some work is going on within IETF to make mobile credentials to be stored in software. 4.4 Certificate Management In certificate management there are two main issues – which certificate format to use and how to check status of received certificates? For Wireless, we can’t use X.509 certificates because they are somewhat more complex to decode and are larger in size. Server certificates are to be processed by the mobile client devices, which do not have the local resources or the communication bandwidth to implement revocation methods used in the wired world such as Online Certificate Status Protocol (OCSP). Due to network constraint, checking Certificate revocation list (CRL) is really a big issue.

Deployment of Public-Key Infrastructure in Wireless Data Networks

223

In the wireless world, instead of X.509 there are other special purpose and more compact certificate formats are defined such as X9.68, WAP WTLS Certificates, and Bullet certificates [9], [10], [11] & [13]. WAP WTLS mini-certificates are functionally similar to X.509 but are smaller and simpler than X.509 to facilitate their processing in resource-constrained handsets. Bullet certificates are used with ECC. The advantage of X.509 is that it is widely deployed and complaint with Internet world but the alternative formats are neither widely deployed nor interoperable. They lock users to wireless world. For checking the status of received certificates, many vendors use Short-lived certificates. With this approach, a server or gateway is authenticated once in a long-term credentials period - typically one year - with the expectation that the one server/gateway key pair will be used throughout that period. However, instead of issuing a one-year-validity certificate, the certification authority issues a new short-lived certificate for the public key, with a lifetime of, say, 25 hours, every day throughout that year. The server or gateway picks up its short-lived certificate daily and uses that certificate for client sessions established that day. If the certification authority wishes to revoke the server or gateway (e.g., due to compromise of its private key), it simply ceases issuing further short-lived certificates. Clients will no longer be presented with a currently valid certificate, and so will cease to consider the server authenticated. The main advantage of this technique is that there is no need for revocation lists whereas use of online checking creates extra round trips and more network traffic. 4.5 PKI Interoperability Internet PKI protocols such as CMP (Certificate Management Protocol), CSC (Certificate Status Check), OCSP etc. are not optimized for constrained networks and devices. Developing new protocols for this means, “split universe” because it creates need for translating all the proxies or gateways. One possible approach for this problem could be to develop and standardize a separate set of protocols. This is exactly done by WAP forum. WAP is optimized for wireless environment. One disadvantage of WAP is that it does not provide end-to-end security because plain text is available at the gateway. For PKI interoperability, a joint work between Telecom Companies and IETF has been initiated whose focus is to amend TLS protocol and WAP for a better Internet convergence 4.6 Mobile Device Problems The mobile handset may be lost, stolen, broken or loose power. If any of these things happen then how a subscriber authenticate and sign transactions? The possible approaches to remove this Key phobia could be use of specialized authentication/ signature token or there should be some mechanism to hold the keys without a need for recharging batteries. The other alternatives could be widespread usage in shared secret systems and small key size.

224

A.K. Singh

5 Conclusion and Future Trends Security is a key issue for almost every enterprise that is looking to implement Wireless applications. At present there is a lot of uncertainty in the market as to what is available and how secure the products really are. For a specific application, there are ways of addressing the PKI deployment issues; depending on how much money is available and how important the particular issue is. But for a general application, we need a standard solution. Future trends show that the constraints of wireless network will be reduced due to technological innovations. 3G phones and networks will offer more CPU capability, available memory and network bandwidth. Due to this, future wireless applications will be able to implement today’s Internet PKI protocols but they will continue to lag wired networks and devices in terms of computational power, bandwidth etc. At present the security in Wireless application needs a specialized solution e.g. formats, protocols, storage etc. An adoption of Internet protocols (PKIX) and formats in the wireless data networks are likely to take place in the long run. Some convergence will probably occur on the wired network front too e.g. Internet protocols might be modified to accommodate wireless environments.

References 1. Singh, A.K.: E-Commerce Security. Proc. of National Seminar on E-Commerce & Web Enabled Applications at Harcourt Butler Technological Institute, Kanpur, India (2000) 2. Charles, Arehart et. al.: Professional WAP. Wrox Press Ltd. (2000) 3. Gilbert Held: NPN:The Wide World of Wireless. Network Magazine (December 1999) 4. Hasan, S., et. al.: Wireless Data Networks: Reaching the Extra Mile. IEEE Computer (December 1997) 5. Ramon, J., Hontanon: Encryption 101 – The Choices. Sys Admin (1998) 6. Anita, Karve: PKI Options for Next Generation Security. Network Magazine (March 1999) 7. Fernandez, A.D.: Elliptic-Curve Cryptography. Dr. Dobb’s Journal (December 1999) 8. Epharaim, S.: Solutions on the Horizon will Relieve the Two –Zone Wireless Security Problem. InfoWorld.com (Nov. 2000) 9. http://www.ericsson.com/wapsolutions/common/p11.shtml 10. http://www.phone.com/pub/Security_WP.pdf 11. http://www.nokia.com/corporate/wap/future.html 12. http://www.wapforum.com 13. http://www.nttdocomo.com/release/index.html 14. http://www.ntru.com

A Scalable Framework for Secure Group Communication Lih-Chyau Wuu and Hui-Chun Chen Department of Electronic Engineering, National YunLin University TouLiu, TAIWAN, 640 R.O.C. [email protected] Abstract. In this paper, we propose a scalable framework for secure group communication that not only supports the source authentication, integrity and confidentiality of the group traffic, but also enforces the join secrecy and leave secrecy. Providing security-enhanced services mentioned above for group communication is problematic without a robust group management. The framework adopts two-level group management to improve the scalability problem. To ensure secure group communication it enforces four processes: registration, auxiliary key distribution, re-keying, and secure traffic with source authentication.

1. Introduction In the Internet, multicast [1-2] has been used successfully to provide an efficient, besteffort delivery service for group-based application. In contrary to peer-to-peer secure communication that is well developed, secure multicast remains comparatively unexplored. However, applications such as multiparty private conference, distribution of stock market information, pay per view and other subscriber services which require to embed certain security mechanisms into multicast to protect the integrity of traffic from modifications, guard for confidentiality of communication from electronic eavesdrop, and validate participant's authenticity. In this paper, we propose a scalable framework for secure group communication that not only supports the source authentication, integrity and confidentiality of the group traffic, but also enforces the join secrecy and leave secrecy [3]. In secure group communication, join secrecy ensures that joining members cannot access past group data, and leave secrecy ensures that leaving members cannot access current or future group data. The framework uses digital signatures [4] to provide integrity and source authentication. Providing confidentiality requires securely distributing a group key to each of a group's receivers. Having such a key allows group members to encipher/decipher the traffic within the group. As for join secrecy and leave secrecy, it must change the group key, called as re-keying, whenever member joins or leaves the group. We use auxiliary keys to encrypt the new group key to securely distributing it. Thus, each member has one shared group key and a set of auxiliary keys. Providing security-enhanced service for group communication is problematic without a robust group management to handle membership changes and key distribution [6-7]. The framework conducts the group in two hierarchical levels: a single router domain and one or more member domains.

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 225–238, 2001 © Springer-Verlag Berlin Heidelberg 2001

226

L.-C. Wuu and H.-C. Chen

Each domain has its own manager and an auxiliary key distribution tree. The tree in router domain is in the form of Huffman binary tree and the tree in member domain is in the form of complete binary tree. This minimizes the number of messages exchanged during the re-keying process and storage required by each member. The framework adopts two-level group management to improve the scalability problem. It also enforces four processes: registration, auxiliary key distribution, rekeying, and secure traffic with source authentication to ensure secure group communication. In the following, we first introduce the basic model of the framework, then explain the operation of the four protocols. Finally is the conclusion.

2. Basic Model To initialize a group, a host called as group initiator makes an announcement. Any host, which is interested in the group, becomes a registered member after it executes registration process. A registered member does not have the group key. To have the group key, a registered member must become a participant member by executing join process. A participant member becomes a registered member when it executes leave process. For simplicity, in the remainder of this paper the term "member" is referred to participant member. To take advantage of Internet architecture, we conduct the group in two hierarchical levels: a single router domain and one or more member domains. Router domain consists of multicast-capable routers, and member domain contains at least one member host and one multicast-capable router. Each domain has a manager to handle local registration, membership changes and key distribution. The router that the group initiator is located is called the group manager, and the other routers are called the subgroup manager. Fig. 1. shows the general structure of the two-level group management in our framework. GM

Group Manager

SM

Subgroup Manager

M

Member Domain

M

M M

Group Member

M

M GM SM

SM

M

Router Domain

SM

M M

M M

M

M

Fig. 1. The structure of the two-level group management

The symbols used in the paper are explained as follows. It is assumed that each domain has a certification authority and there exists trust-relationships among the

A Scalable Framework for Secure Group Communication

227

certification authorities. Each member or router has a long-term public key pair before joining any group and generates a short-term public key pair during a group communication. Each key pair is certified. Symbol G I R M GrpKey -1 KA, KA -1 k a, k a -1 [Data] ka -1 {Data} ka -1 ka → 6

Meaning Group name Group manager Subgroup manager Member Group key Long-term public key pair of user A Short-term public key pair of user A -1 Data being encrypted by key ka A digital signature given by user A -1 -1 ka = Data, {Data} ka Unicast Multicast



Broadcast

3. Registration In order to initialize a group G, the group initiator X announces the group information by the following procedure. First X sends a Grpinit message to its local router I. I becomes the group manager and broadcast a Regstart message to all routers in Internet. Each router then broadcasts a Regstart message to all local hosts in its networks. Note that all messages with a digital signature to ensure the message integrity and source authentication, and a field Ti is against replay attack. (1) −1 X → I : GrpInit ( < G , Info, T X > K X ) (2) −1 I ⇒ all routers : RegStart (< G , Info, RegTime I , TI > K I ) (3) −1 R ⇒ local hosts : RegStart (< G , Info, RegTime R , TR > K R ) A host interested in the group must send a Register message to its local router R during the time RegTimeR. The router R becomes the subgroup manager and registers itself to the group manager I after the time RegTimeR is expired. The Register message, sent by the router R, has a field RekeyingWeight to denote the number of registered number in this Member Domain. Note that at registration process, each M and R must produce its short-term public key pair to be used during the group communication and put the public key k x on the Resister message. (4) −1 M → R : Register (< G , k m , TM > K M ) (5) −1 R → I : Register (< G , k r , RekeyingWeight , TR > K R Rekeying Weight = Number of Registered Member

228

L.-C. Wuu and H.-C. Chen

4. Auxiliary Key Distribution After the time RegTimeI is expired, the group manager establishes a Huffman binary tree and each subgroup manager establishes a complete binary tree. Each tree denotes a set of auxiliary keys distribution. Although the logical structure of a group is a twolevel, the group key is shared by all of the participant members and the auxiliary keys are used to securely distribute a new group key in re-keying process. 4.1 Complete Binary Tree in Member Domain In the Member Domain, we employ the approach in [8] to distribute the auxiliary keys in a complete binary tree. As shown in Fig. 2(a), the square leaf nodes in the tree denote the registered members or null in the domain. The round internal nodes denote the auxiliary keys in the Member Domain. Each participant member holds the auxiliary keys on the branch from the leaf representing itself to the root of the tree. For example, member m6 holds the auxiliary keys K Top , K 2 , K 1 and K 0 . Key Level Key Node

K top

Member Node

Top, 3

K2

K0

K0

K1 K0

K0

RK2

l

m7

m6

m5

m4

m3

m2

110

101

100

011

010

A

B

C

D

E

50

50

8

50

33

0.047 0.047 0.294 0.047 0.07

RK2

RG

null

2

RC

RK1

LID: 1100 UID: 1111

null

RK1

RK1

RK0 RK0 RK0 RK0 RK0 RK0

(a) Auxiliary-key distribution in a complete binary tree Subgroup Manager Rekeying Weight Rekeying Probability

RK2

RK2

3

K0 0

MID: 111

RK3

2

K1

K1 K0

K0

Key Level Top, 4

RKtop

RK3

K2

K1 K0

Key Node Subgroup Manager Node

F

G

H

J

RA

RB

RD

RF

RE

RH

50

10

33

17

1011 1011

1010 1010

1001 1001

1000 1000

0111 0111

0110 0110

RK1 0000 0011

l

RJ 0100 0101

0

0.047 0.235 0.07 0.141

(b) An example of Rekeying weight

(c) Auxiliary-key distribution in a huffman binary tree

Fig. 2. Auxiliary key distribution in Member Domain and Router Domain Each registered member is assigned a unique binary string as its member ID (MID), denoted by bn-1bn-2…b0, where n is the depth of the binary tree and bi can be either 0 or 1. The MID corresponds to auxiliary-keys held by a participant member. A participant member (MID=bn-1bn-2…b0) will hold K Top and

K i if bi =1 or K i if bi =0,

where 0 ≤ i ≤ n-1. 4.2 Huffman Binary Tree in Router Domain In the Router Domain, we distribute the auxiliary keys held by the subgroup managers in a Huffman binary tree. Fig. 2(b) gives an example with 10 Member Domains. The group manager first computes the rekeying probability of each Member Domain X as follows:

A Scalable Framework for Secure Group Communication

rekeying probablity x =

229

1 / MemberDomainSize x ∑ 1 / MemberDomainSize j

Then the group manager establishes a binary tree by executing Huffman algorithm. As shown in Fig. 2(c), the square leaf nodes in the tree denote the subgroup managers. The round internal nodes denote the auxiliary keys in the Router Domain. Each subgroup manager holds the auxiliary keys on the branch from the leaf representing itself to the root of the tree. Every subgroup manager is assigned two unique binary string: upper ID (UID) and lower ID (LID), denoted by un-1un-2…u0 and ln-1ln-2…l0 respectively, where n is the depth of the Huffman tree and ui (li) can be either 0 or 1. The UID and LID of a subgroup manager are assigned as follows: On the tee level i (0 ≤ i ≤ n-1) If the subgroup manager holds RK i then ui = li =1. If the subgroup manager holds RK i then ui = li =0. Otherwise ui =1, li =0. For example, in Fig. 2.(c) the UID and LID of the subgroup manager RJ are 0101 and 0100 respectively since RJ holds RK 3 on level 3, RK 2 on level 2, RK1 on level 1 and nothing on level 0. During the group communication, a participant subgroup manager (UID= un-1un…u 2 0, LID=ln-1ln-2…l0) will hold RK Top and RK i if ui = li =1 or RK i if ui = li =0, where 0 ≤ i ≤ n-1. For example, in Fig 2(c) the UID and LID of RC are 0011 and 0000, RC will hold RK top , RK 3 and RK 2 .

5. Re-keying Mechanism To have confidential group communication, the group key must be changed periodically, or whenever some registered member joins or participant member leaves the group. It is the responsibility of the group manager to generate a new group key and distribute it securely to the group. It is noted that after a join or periodic key changing, the new group key can be sent by using the previous group key to encrypt it and no auxiliary key needs to be changed. However, after a leave, the previous group key can not be used to encrypt the new group key. Thus, the group manager must use the auxiliary key in Huffman tree to encrypt the new group key then multicast to the subgroup managers first. Then each subgroup manager uses the auxiliary key in its complete binary tree to encrypt the new group key then multicast to all its local members. Subsequently, some member or manager must update its new auxiliary key by itself if necessary. The updating auxiliary key is as follows: newAuxiliaryKey = f ( AuxiliaryKey , newGrpKey ) , where f() is an one-way hash function. In the following, we explain how the group/subgroup manager distributes the new group key securely whenever membership changes.

230

L.-C. Wuu and H.-C. Chen

5.1 Single Registered Member Joins A registered member joins a group by sending a JoinRequest message to its subgroup manager. The remaining procedure depends on if the subgroup manager has joined the group or not. Case I: the subgroup manager has not joined the group yet. If the subgroup manager receives the JoinRequest message for the first time, it means that the subgroup manager has not joined the group yet that it must join the group by sending a JoinRequest message to the group manager. The group manager first generates a new group key (denoted by newGrpKey), then encrypts it by the old group key (denoted by GrpKey) and multicast it to the group. After that, the group manager sends a JoinConfirm message to the subgroup manager with the new group key and the corresponding auxiliary keys needed by the subgroup manager. Finally, the subgroup manager sends a JoinConfirm message to the joining member with the new group key and the corresponding auxiliary keys needed by the member. (6) −1 M → R : JoinRequest (< G,TM > k m ) (7) −1 R → I : JoinRequest (< G,TR > k r ) (8) −1 I 6 G : Rekey ( [< newGrpKey , TI > k i ]GrpKey ) −1 (9) I → R : JoinConfirm([< k i , newGrpKey, auxiliarykeys R , TI > K I ]k r ) −1 (10) R → M : JoinConfirm([< k , k , newGrpKey, auxiliarykeys , T > K ]k ) i

r

M

R

R

m

Case II: the subgroup manager has joined the group. When the subgroup manager has joined the group, it sends a RekeyRequest message to the group manager after receiving a JoinRequest message. The group manager first generates a new group key, then encrypts it by the old group key and multicast it to the group. After receiving the Rekey message, the subgroup manager sends a JoinConfirm message to the joining member with the new group key and the corresponding auxiliary keys needed by the member. (6) −1 M → R : JoinRequest (< G,TM > k m ) (7a) −1 R → I : RekeyRequest (< G, " join" , TR > k r ) (8) −1 I 6 G : Rekey ( [< newGrpKey , TI > k i ]GrpKey ) (10) −1 R → M : JoinConfirm ([< k i , k r , newGrpKey , auxiliarykeys M , TR > K R ]k m ) 5.2 Single Participant Member Leaves A participant member leaves the group by sending a LeavingRequest message to its subgroup manager. The remaining procedure depends on if the subgroup manager needs to leave the group or not.

A Scalable Framework for Secure Group Communication

231

Case I: the subgroup manager does not need to leave the group. The subgroup manager can not leave the group when there are other participant members in the domain. Thus, the subgroup manager sends a RekeyRequest message to the group manager. The group manager first generates a new group key, then encrypts it by the auxiliary key in the root of the Huffman tree (denoted by

RK Top )

and multicast it to all the subgroup managers. For the subgroup manager whose member leaves, it encrypts the new group key by the auxiliary key in its binary tree and not being held by the leaving member, and the non-leaving members in this domain must change their auxiliary keys after receiving the new group key. As for the other subgroup manager, they use the auxiliary key in the root of their binary tree to encrypt the new group key. The members in those domains do not need to change their auxiliary keys. −1 M → R : LeavingRequest (< G,TM > k m )

(11)

−1 R → I : RekeyRequest (< G, " leaving" , TR > k r ) −1 I 6 ∀R x : Rekey ( [< newGrpKey , TI > k i ]RK top )

(12)

For R with member leaving ( MID = bn−1bn−2 ...b0 )

(13) (14)

for(j = 0 to n-1) −1 R if(b j = 0) then R 6 ∀M R : Rekey ([< newGrpKey , TR > k r ]K j ) −1 R if(b j = 1) then R 6 ∀M R : Rekey ([< newGrpKey , TR > k r ]K j ) end for All members in the member domain R change their auxiliary keys : newAuxiliaryKey = f ( AuxiliaryKey , newGrpKey ) For R x without member leaving R X 6 ∀M R

X

(15)

−1 Rx : Rekey ([< newGrpKey , TR > k r ]K top ) x x

Case II: the subgroup manager needs to leave the group. When the last participant in this domain is leaving the group, the subgroup manager must leave too. It sends a LeavingRequest message to the group manager. The group manager first generates a new group key and encrypts it by the auxiliary key in the Huffman tree and not being held by the leaving subgroup manager, then multicasts it to all the other subgroup managers. After receiving the new group key, the nonleaving subgroup managers encrypt it by the auxiliary key in the root of their binary tree, then multicast it to their local members. After that, the non-leaving subgroup managers change their auxiliary keys. (11) −1 M → R : LeavingRequest (< G,TM > k m )

232

L.-C. Wuu and H.-C. Chen

−1 R → I : LeavingRequest (< G, TR > k r ) For the group manager I

(12a)

(13a)

( assume the leaving sugroup manager UID = u n−1u n−2 ...u 0 , LID = l n−1l n−2 for ( j = 0 to n-1) −1 if (u j = l j = 0 ) then I 6 ∀R X : Rekey ([< newGrpKey , TI > k i ]RK j ) −1 else if (u j = l j = 1) then I 6 ∀R X : Rekey ([< newGrpKey , TI > k i ]RK else break the forloop end for For each nonleaving subgroup manager R x R X 6 ∀M R

(15a)

−1 Rx : Rekey ([< newGrpKey , TR > k r ]K top ) x x X

R X changes its auxiliary keys in Huffman tree newAuxiliaryKey = f ( AuxiliaryKey, newGrpKey ) 5.3 Multiple Registered Members Join It's more efficient to aggregate several join requests to reduce the number of rekeying. Thus, no matter whether the group manager or any subgroup manager who can batch the join/re-keying requests to reduce transmission and encryption cost. The join procedure (6)-(10) stated above still can be applied in multiple registered members joining. 5.4 Multiple Participant Members Leave To aggregate several leaving requests efficiently, it is desired to minimize the number of messages sent to the group when executing re-keying step (13a) or (14). To do that, it first needs to decide some auxiliary keys, called as communal auxiliary keys, which are common to subsets of the non-leaving members/subgroup managers but not being held by the leaving members/subgroup managers. Then those keys are used to encrypt the new group key. No matter in Member Domain or Router Domain, to determine the communal auxiliary keys is based on the Boolean algebra minimization method. The approach is explained as follows. Case I. Multiple members leave from a Member Domain When multiple members leave from the same Member Domain, the subgroup manager can batch the leaving requests then send one "RekeyRequest" message (12) instead of several ones. After receiving the new group key, the subgroup manager performs a minimization of the Boolean membership function [8] to decide the communal auxiliary keys.

A Scalable Framework for Secure Group Communication

233

The input of the Boolean membership function is the MID of each leaf node in the complete binary tree, and the corresponding output is as follows. • The field containing a 0 corresponds to the member that leaves the domain now. • The field containing a 1 corresponds to the remaining participant member. • The field containing an X corresponds to the registered member or the leaf node has not been assigned to any member. For example, assume that the leaf node m6 in Fig. 2(a) is a registered member, and m0 and m1 have not been assigned to any member. Now the participant member m3 and m7 leave the domain at the same time. The Boolean membership function is shown as Fig. 3(a). More details about minimizing the Boolean function can be found in [5]. Fig. 3(b) shows a Karnaugh map representation of figure 3(a), and Fig. 3(c) identifies the largest possible rectangles containing only 1 and X. The minimization output is b1 + b 0 . Thus, the subgroup manager encrypts the new group key by K1 and K 0 respectively, and multicast the encrypted messages to its Member Domain. The message encrypted by K1 can be decrypted by m5 and m4 only, and the message encrypted by K 0 can be only decrypted by m2, and the leaving member m3 and m7 can not decrypt the new group key anyway. Note that the result of minimizing a Boolean function is a sum of product expression. Each product term represents a key used to encrypt the new group key. However, a product term may consist of more than one literal. In such a case, the key, called as conjoint key, must consist of more than one auxiliary key. For example, if some minimization output is b1 + b 2 b0 , then the subgroup manager encrypts the new group key by the auxiliary key K1 and the conjoint key K 2 0 respectively, where K

20

= f (K 2 , K 0 ) .

Fig. 3. Boolean algebra minimization in Member Domain

Case II. Multiple subgroup managers leave from the Router Domain When multiple subgroup managers leave the Router Domain, the group manager can batch the leaving requests and execute one Re-keying instead of several ones. After

234

L.-C. Wuu and H.-C. Chen

generating a new group key, the group manager performs a minimization of the Boolean membership function to decide the communal auxiliary keys. Since the minimization is based on the MID of a complete binary tree, we first expand the Huffman binary tree to a complete binary one. After that, some subgroup managers may have more than one MID. For example, Fig. 4 shows the expanded complete binary tree from the Huffman tree in Fig. 2(c). The subgroup manager RG has MID 1111~1100, and RJ has MID 0101 and 0100. RK top

Key Node Subgroup Manager Node

RK 3

RK 3

RK 2

RK 2

RK 2

RK 2

RG

RC

RK1 RK 0 RK 0 RA MID 1111~1100 1011

RK1

RK1 RK 0 RK 0

RK 0 RK 0

RK1 RJ

RB

RD

RF

RE

RH

1010

1001

1000

0111

0110 0101~0100 0011~0000

Fig. 4. An expanded complete binary tree

The input of the Boolean membership function is the MID of each leaf node in the expanded complete binary tree, and the corresponding output is as follows. • The field containing a 0 corresponds to the subgroup manager that leaves the group now. • The field containing a 1 corresponds to the remaining participant subgroup manager. • The field containing an X corresponds to the subgroup manager has not join the group yet. For example, assume that the subgroup manager RA, RG, RJ will leave the group. The corresponding Boolean membership function and minimization process is shown as Fig 5. The minimization output is b3 b1 + b 2 b1 + b2 b0 . That means the group manger can use the three conjoint keys

RK

31

= f ( RK 3 , RK1 ) ,

RK

21

= f ( RK 2 , RK1 )

and RK 20 = f ( RK 2 , RK 0 ) to encrypt the new group key, and guarantee that the leaving subgroup manager RA, RG, RJ can not decrypt the new group key. Although the Boolean minimization method works well in a complete binary tree, it is incomplete in the Huffman tree. For example, the remaining subgroup manager RC can not get the new group key since it has only the auxiliary keys RK 3 and RK 2 . It's impossible for RC

A Scalable Framework for Secure Group Communication

235

to generate any one of the conjoint keys RK 3 1 , RK 2 1 , RK 2 0 . Thus, after performing the Boolean minimization, the group manager must execute a complementary procedure described in Fig. 6 to make sure the remaining subgroup managers can get the new group key. I n p u t( M I D ) C o r r e s p o n d O u t p u t b 3b2b1b 0 Router 0000 C 1 0001 C 1 0010 C 1 0011 C 1 0100 J 0 0101 J 0 0110 H 1 0111 E 1 1000 F 1 1001 D 1 1010 B 1 1011 A 0 1100 G 0 1101 G 0 1110 G 0 1111 G 0

b1b0

01

11

10

00

01

11

10

00

1

1

1

1

00

1

1

1

1

01

0

0

1

1

01

0

0

1

1

11

0

0

0

0

11

0

0

0

0

10

1

1

0

1

10

1

1

0

1

(b) Karnaugh Map

(a) Boolean membership function

b1b0

00

b3 b 2

b3 b 2

(c) Prime term selection

Fig. 5. Boolean algebra minimization in Member Domain

Input: COMK = {C 1 ,C 2 ,...,C n } , C i is the co rrespondin g communal auxiliary keys s et of the product te rm i of Bo olean mini mization o utput REMSG = {SG 1 ,SG 2 ,...SG m },SG j is the re maining su bgroup man ager j AUXK = {AK 1 ,AK 2 ,...,AK m },AK j is the au xiliary ke ys set of SG j

Output: COMPK : the comple ment keys set Procedure: Begin COMPK = φ for j = 1 to m if UID and LID o f SG j are diff erent then if all C i such that C i ⊄ AK j then add AK j to COMPK End for End Fig. 6. Complementary Procedure

236

L.-C. Wuu and H.-C. Chen

Continuing

the

above

example,

COMK={{ RK 3 , RK 1 },{ RK 2 , RK 1 },

{ RK 2 , RK 0 }} REMSG={RB, RD, RF, RE, RH, RC}, AUXK={AKB, AKD, AKF, AKE, AKH, AKC}, where AKB={ RK 3 , RK 2 , RK 1 , RK 0 }, …, AKC={ RK 3 , RK 2 }. Since only the RC whose UID is not equal to LID and there does not exist a Ci in COMP which is a subset of AKC. Thus COMPK={{ RK 3 , RK 2 }}, the group manger must multicast four re-keying messages being encrypted by

RK 3 1 , RK 2 1 , RK 2 0 and

RK 3 2 respectively. 6. Secure Traffic with Source Authentication In fact, any message transmitted in the group is required with a sender's digital signature to provide the source authentication and message integrity. In addition, a sender can use the group key to encrypt the group traffic to afford message confidentiality. Thus, any member must use the following format to transmit the group traffic. (16) −1 M 6 G : GroupData ([ < Data > k m ]GrpKey

7. Comparison with Previous Works In this section, the proposed framework is compared with the works of [9], [10], [11], [12], [8]. The structure of key management will affect the number of messages needed in a re-keying process and the storage needed by each member to keep the auxiliary keys. In [9] and [10], the group is divided into multiple subgroups with a hierarchy of group security agents. A star structure for auxiliary key distribution is in each subgroup, that is, each member has an auxiliary key. In [9] there does not exist a key shared by all the group members. Thus, the group traffic must be decrypted/encrypted whenever through an agent. That increases the data transmission time a lot and the overhead of each agent. The scheme proposed in [11] uses a hierarchy of keys to solve the scalability problem. The binary tree of auxiliary keys distribution is proposed in [12] and [8] which reduces the number of auxiliary keys needed from O(N) in [11] to O(log N), where N is the number of group members. They use Boolean function minimization to reduce the number of messages needed in a re-keying process. Table 1 and 2 show the number of keys needed in a group and the number of messages needed in a re-keying process respectively. Assume that the number of group members is N and there exists one router domain and m+1 member domains (or subgroups) and Mi denotes the size of a member domain i. Table 1 shows that the number of keys needed by ours is less than [9], [10] and [11], and is approximately the same as [12] and [8]. Table 2 shows that our scheme needs less number of messages than the others in a re-keying process.

A Scalable Framework for Secure Group Communication

237

Table 1. The number of keys needed in a group [9] Group Key Subrou p Key

[10] [11]with degree d

0

1

m+1 M+1 d

Auxilia N+m N+m ry Key

d −1

[12]

[8]

Ours

1

1

1

1

0

0

0

m+2

( N − 1)

2 log 2 N 2 log 2 N

m ∑ 2 log 2 M i + 2 ( m − 1) ~ 2 (log m ) 2 i =0

Table 2. The number of messages needed in a re-keying process

Requested Subgroup Manager Nonrequested Subgroup Manager Group Manager

Join Leave

[9]

[10]

2

2

[11] with degree d

[12] , [8]

Ours log 2 M i + 2

Mi −1 Mi −1

log 2 M i

Join

0

0

0

Leave

0

1

1

Join

1

2 (log d N − 1)

log 2 N + 2

1 or (( log 2 m + 2 ) ~ m )

Leave

m

d (log d N − 1)

log 2 N

1 or ( log 2 m ~ ( m − 1))

8. Conclusion In this paper we propose an efficient two-level management for secure group communication. The group is divided into one router domain and several member domains. Such a division can solve the scalability problem and is in accordance with Internet architecture. A group key is shared by all of the members. This makes the group can use any multicast protocol to transmit the group traffic and only the sender/receivers need to do encryption/decryption. The framework establishes a complete binary tree at each member domain, but a Huffman tree at the router domain. It lets the subgroup manger with more registered members to have more auxiliary keys, and the subgroup manager with less registered members to have less auxiliary keys. This is because the probability that the subgroup manager with less members leaves the group is higher than the one with more members. The group manager uses auxiliary keys, which can not be held by the leaving subgroup manager, to encrypt the new group key. Thus, it is preferred that a subgroup manager with high probability of leaving the group has less auxiliary keys to make the decision of communal auxiliary keys easy.

238

L.-C. Wuu and H.-C. Chen

References 1. N.F.Maxemchuk, “Video Distribution on Multicast Networks”, IEEE Journal on Selected Areas in Communications, Vol. 15, No. 3, April 1997, pp.357-372. 2. B.M.Waxman, “Routing of multiple connections”, IEEE Journal on Selected Areas in Coom, 1988, pp.1617-1622.

3. M.J.Moyer, J.R.Rao, P.Rohatgi, “A survey of security issues in multicast communications”, IEEE Network, 1999, pp.12-23.

4. B.Schneier, Applied Cryptography , second edition, John Wiley & Sons, Inc., 1996. 5. E.J.McCluskey, "Minimization of Boolean Functions", Bell System Tech. Journal, Vol. 35, No. 6, Nov., 1956, pp.1417-1444. 6. D.Wallner, et al., “Key Management for Multicast: Issues and Architectures”, RFC 2627. 7. P.S.Kruus, J.P.Macker, “Techniques and issues in multicast security”, Military Communications Conference, 1998. MILCOM 98. Proceedings, IEEE, 1998, pp.10281032. 8. I.Chang, et al., “Key management for secure Internet multicast using Boolean function minimization techniques”, INFOCOM '99, pp.689 -698. 9. S. Mittra, ”Iolus: A Framework for Scalable Secure Multicasting”, Proceedings of ACM SIGCOMM’97, Cannes, France, 1997, pp.277-288. 10. T.Hardjono, B.Cain, “Secure and Scalable Inter-Domain Group Key Management for N-toN Multicast”, 1998 International Conference on Parallel and Distributed Systems, 1998, pp.478-485. 11. C. K. Wong, et al., ”Secure Group Communications Using Key Groups”, Proceedings of ACM SIGCOMM’98. 12. G.Garonni, et al., “Efficient security for large and dynamic multicast groups”, Seventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative, 1998, pp.376-383.

Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques 1

Mohamed Al-Ibrahim and Josef Pieprzyk

2

1

School of IT & CS University of Wollongong Wollongong, NSW 2522 Australia [email protected] 2 Department of Computing Macquarie University Sydney, NSW 2109 Australia [email protected]

Abstract. We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.

1

Introduction

Communication in computer network may be established as a unicast or multicast connection. In a unicast connection, messages are flowing from a single sender to a single recipient. In a multicast connection, however, a single sender conveys messages to many receivers. Distribution of Pay TV channels is typically done using multicast communication. Protection of multicast messages includes normally both their confidentiality and authenticity. However, in majority of network services, confidentiality seems not to be of the main concern. Authentication of messages is normally the main security goal. This is true in the Internet environment where most web pages are publicly available while their authentication is the major security worry – the lack of proper authentication is always an attractive target for hackers with inclinations for practical jokes. Source authentication is the main theme of this work. This problem has been already addressed for unicast connections. For instance, the IPSec protocol suit or IP version 6 on the network layer supports source authentication. Higher layers on the OSI reference model, make use of authentication services provided by Secure Socket Layer (SSL). Authentication is normally based on message authentication codes P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 239–249, 2001 © Springer-Verlag Berlin Heidelberg 2001

240

M. Al-Ibrahim and J. Pieprzyk

(MACs) generated using private-key cryptography where the sender and receiver share the same secret key. This approach cannot be easily extended to cover authentication for multicast connections. Public-key cryptography offers an alternative solution for authentication which is ideal for multicast communication – the transmitted message is digitally signed by the sender (holder of the secret key) and every body can verify the validity of the signed message by using the matching public key. Unfortunately, both generation and verification of digital signatures are very expensive as they consume a lot of computing resources. Additionally, digital signatures are excessively long normally more than 778-bits consuming extra channel bandwidth. Multicast is commonly used for many real-time applications such as multimedia communication for distant teaching, dissemination of digital video, etc. Some of distinct features of multicasting include: • possible packet loss at some (or perhaps all) destinations, were there is no standard reliable multicast IP protocol yet, • the application tolerates some packet loss but does not tolerate an excessive delay. Authentication of multicast messages (streams) has to: • provide strong security – no outsider is able to insert packets with forged contents. All packets accepted at destinations have to be genuine, • tolerate loss of packets – any outsider or/and noisy channel may erase a strictly defined number of packets. The number is typically determined by the application. The application refuses to work correctly if the number of accessible packets drops below the limit, • be fast and efficient. The work is structured as follows. Section 2 reviews related work. Section 3 describes the model and states the assumptions for a multicast environment in which the proposed solutions are be based on. In section 4 we present two schemes using linear equations and in section 5 we present two schemes based on Combinatorial Designs.

2

Related Work

There are many interesting papers published recently that are dealing with multicast stream authentication (see [1,2,3,4,5,6]). The solutions proposed there can be divided into two broad classes. The first class includes solutions based on MACs (private-key cryptography). The second one employs digital signatures (public-key cryptography). Genaro and Rohatgi [1] used digital signatures to authenticate multicast streams. They considered two cases: on and off-line. In the off-line version, they used a chaining of packets. The digest of packet Pi depends on its predecessor Pi+1. The first packet is signed using a one-time signature. This technique is efficient and introduces a minimum packet redundancy but does not tolerate packet loss. In the on-line version, each packet is signed using one-time signature and the packet contains the public key that is used to verify the signature of the preceding packet.

Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques

241

Wong and Lam [3] applied Merkle signature trees to sign a stream of packets. In this scheme a block of packets are buffered to form the leave of a tree, in which the message digests of the packets are computed and the root of the tree is signed. The root is the hash of all message digests of the block. Each packet attaches the hashes of other packets in the block as well as the root of the tree to form ancillary information. The number of attached hashes depends on the degree of the tree. The scheme is designed to run at sufficient speed for real-time applications, add a bearable space overhead from authentication data, and tolerate packet loss gracefully. It was argued in [4] that this scheme increases per-packet computation with packet loss rate especially in the case of mobile receivers that have less computational power and thus have higher packet loss. In their work they tried to overcome this shortcoming by proposing an enhanced scheme. Rohatchi [5] extended idea of [3] by computing hash values ahead of time to reduce the time delay for signing a packet. They extended the one-time signature scheme to k-time signature scheme and reduced the communication and space overhead of one-time signature scheme. The scheme uses 270 bytes for signature and the server has to compute 350 off-line hash values and the client needs 184 hash values to verify the signature. MACs were used in [2] and [4]. As we mentioned earlier that using MACs for multicasting needs special care. The scheme of Canettie at el. [2] uses asymmetric MAC. The idea behind this technique is that the sender holds n keys and shares half of these keys with each receiver of a group such that no two receivers hold the same set of keys that are held by another receiver. The keys are distributed in such a way that it guaranties that no receivers up to W could collide to reveal the n keys hold by the sender, otherwise it would violates the security condition of the scheme. The sender sends a packet attached with n number of MAC's per packet, while the receiver verifies only the MAC’s in the packet that it holds its corresponding keys and ignores the rest. This solution does not suffer from packet loss problem, and each packet is authenticated individually, but it suffers from the space overhead incurred from extra digest messages attached to each packet. Another proposal based on MACs is described in [4]. It uses MACs with delayed key disclosure sent by the sender using chaining technique on periodic basis. The idea is to let the sender to attach to each packet a MAC, which is computed using a key k known only to it. The receiver buffers the received packet without being able to authenticate it. On period time d, which is set in advance, the sender discloses the key k that is used to authenticate the buffered packet on the receiver side. Packets that received after the period time are discarded. Actually, the key k is used to authenticate all the packets in the period interval d. The sender and receiver have to synchronize their timing to ensure correct key disclosures.

3

Model

Messages we would like to authenticate are coming from a single source and are distributed to multiple destinations (multicasting). Authentication by signing the whole message is not an option when the message is very long or alternatively, if the transmission of the message may take unspecified period of time (the length of message is not known before hand). Real-time live TV communication is of this type.

242

M. Al-Ibrahim and J. Pieprzyk

On the other hand, a vendor who offers video channel normally knows the length of the transmitted message but the verification of message authenticity could be done at the very end of the movie and it fails with a very high probability due to some lost or/and corrupted packets (multicast connections are not reliable). Given a long message M (it is also called a stream). The message is divided into blocks of well defined size and each block consists of n datagrams (packets). Assume that stream is authenticated by signing blocks. There are two possibilities: (1) blocks in the stream are signed independently – attackers may change order of blocks without receivers noticing it. To prevent this, blocks may contain the sequence number or other timestamping information. This possibility is suitable for applications that tolerate loss of blocks. For instance for live TV, loss of a block is typically perceived as a momentary freeze of the frame, (2) blocks are signed in a chaining mode – the signature of the current block depends on its contents and on all its predecessors. Attackers are no longer able to manipulate the order of blocks. Loss of a block, however, makes authentication of all blocks following the lost, impossible. This option suits applications that do not tolerate loss of blocks. Consider a block B which consists of n datagrams so B = ( m1 , " , m n ) . Our attention concentrates on authentication of a single block so that: 1. verification of authenticity of blocks is always successful if receivers obtained at least t datagrams (out of n sent) – authentication tolerates loss of up to d = n − t packets, 2. expansion of packet contents is minimal – redundancy introduced to the block is minimal under the assumption that authentciation tolerates loss of d datagrams, 3. generation of signatures and their verification is efficient, i.e. computing resources consumed by them is reasonable (or in other words, the delay caused by them is tolerable by the applications run by receivers). The last point needs further ellaboration. The sender (source) is normally much more powerful than recepients. If this is true then authentication can be performed as follows: • a powerful sender generates (expensive) digital signatures independently for each block, • a receiver applies batch verification of signatures, i.e. merges signatures of blocks and the result can be verified as a single signature. This solution is quite attractive especially for applications which tolerate longer delays, in which the validity of blocks can be asserted only after receiving the last signature in the batch. Also this solution must be applied with an extreme caution as attackers may inject invalid signatures and false messages which will cancelled each other in the batch (verification process gives OK when, in fact, false blocks have been injected to the stream). More formally, stream authentication scheme is a collection of two algorithms: • A=GEN(B,secret_key) – generates authenticator A for a block B with the aid of the sender secrret key,

Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques



243

VER(B,A,secret_key) – verifies verify authenticator A attached to the block B using sender’s public key. The result is binary and can be either OK or FAIL.

The scheme must : • tolerate loss of packets within the block – any t out of n packets allows to run the algorithm VER which can generate either OK or FAIL, • be secure – any malicious/accidental change of either contents or order of packets within the block must be detected by receivers, • introduce minimal redundancy to the block B, or in other words, the bandwidth expansion should be minimal, • be efficient – execution of both algorithms GEN and VER should consume small amount of computing resources (if the sender is powerful than efficiency of GEN is not crucial). The above requirements are typically referred as the design goals.

4

Stream Authentication Based on Linear Equations

We start from the following authentication scheme. It authenticates a single block B using a digital signature generated for the hash value of the block B. The verification algorithm can be run if all hash values of packets are available. In our scheme, t hash values are obtained directly from packets (we assume that t packets from the block have arrived safely to the destination). The missing d hash values are computed from the information attached to an extra packet m n +1 . __________________________________________________________________ Stream Authentication (Scheme 1) GEN(B, secret_key): 1.

Divide the message block B into n datagrams m 1 ... m n .

2.

Create hi = H( mi ) for i =1,…, n where H is a collision resistant hash function such as MD5 or SHA1.

3.

Form a polynomial:

and compute d control values F ( j )

i −1

i =1

for

j = 1,.., d.

4.

Compute the message digest D = H ( h1 ,...., hn )

5.

Sign the computed value D using a strong cryptography signature scheme S.

6.

Return datagram: m n +1 = F (1) || ...|| F(d) || S (D,secret_key), where S (D,secret_key) is the digital signature generated in step 5.

~

VER( B , m :

n

F (x) = ∑ hi x

n +1 , public_key)

244

M. Al-Ibrahim and J. Pieprzyk

~

1.

The block B must contain at least t datagrams. If this does not hold or m n +1 does not exist, the algorithm returns FAIL.

2.

If the number of packets in B is at least t, then order the datagrams correctly so the sequence is identical with the one in the source with at most d missing datagrams.

3.

Find all the hash values hi for the packets from B . Note that at least t hash values are generated. Compute the missing hash values for lost datagrams from the d control values F( j ); where j = 1, .. ,d. In other words, solve the system of linear equations generated from the control values. Verify the signature using a native (to signature) verification algorithm and the public key of the sender. If the signature is correct return OK, otherwise exit FAIL.

4. 5.

~

~

Consider the design goals. The first goal – tolerance for packet loss – is not achieved. The scheme works only if the (n+1)-th packet containing control values arrives to the destination. Consider the case when t packets arrived safely to the destination together with the last packet m n +1 . Without the loss of generality, assume that these packets are ( m1 , " , mt ) . The receiver can run the verification algorithm VER if they are able to compute the digest D of the whole block. To do this, they must be able to recover hash values of all packets. First, they compute values h1 , " , ht directly from the available packets. Next, they compute the missing ones from the control values accessible in the (n+1)-th packet. In other words, they solve the following system of linear equations: F (1) − a1 F ( 2) − a 2 # F (d ) − a d

=

" ht +1 + + hn t n −1 = ht +1 × 2 + " + h n × 2 # # % # t n −1 = ht +1 × d + " + h n d

where a r = h1 + h 2 r + " + ht r

t −1

for r = 1, " , d . The above system of linear equation has always solutions as it is characterized by a Vandermonde matrix that is always nonsingular (whose determinant is nonzero). Having all hash values, the receiver computes the digest D of the block B and verifies the signature (using the sender public key). We claim that the security of the scheme is equivalent to the security of the underlaying digital signature (assuming that the hash function is collision resistant). To see this, it is enough to note that the only difference between the underlaying signature and the signature used in the stream authentication scheme is the way the verification is being performed. For stream authentication, the verifier computes at least t hash values from packets that safely arrived to the destination while d (or less) missing ones are computed from the control values. For the original signature scheme, the verifier computes all hash values directly from messages. Data expansion is indeed minimal as the receivers are getting the minimum necessary information to successfully run the verification algorithm. This statement is true under the assumption that hash values are much smaller than the payload of

Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques

245

datagrams. In practice, the length of a hash value is 128 bits (for MD5) or 180 bits (for SHA1) while the maximum length of packets in X25 is 8192 bits. As noted, the scheme considered above is not tolerant for the loss of packets. More specifically, the absence of the (n+1)-th packet precludes the receiver from getting the system of linear equation, which are necessary to generate the digest D of the block B. Now we present the second scheme that does tolerate a loss of d packets. The main idea is to distribute the content of the (n+1)-th packet among other packets using a system of linear equations (in a very similar fashion as it has been done for hash values). __________________________________________________________________ Stream Authentication (Scheme 2) GEN(B,secret_key): 1.

Divide the message block B into n pieces m 1 ... m n .

2.

Compute hi = H( mi ) for i =1,…, n and the block digest D = H ( h1 ,...., h n ), where

3. 4.

H is a collision resistant hash function. n i −1 F (x) = ∑ hi x . Create a polynomial i =1 Form a redundant message R=(F(1)||F(2)|| … ||F(d)|| S (D, secret_key )) and split it into t pieces of the same size, i.e.

R = (b0 , " , bt −1 )

where S is a strong cryptography signature scheme.

5.

6.

t −1 R ( x ) = b0 + b1 x + " + bt −1 x and define n control values R (1), " , R ( n ) that are assigned to respective datagrams. Create a polynomial

Return the sequence of datagrams each of the form ( mi , R (i )) for i =1,…, n.

~

VER( B , public_key): 1.

~

The block B must contain at least t datagrams. If this does not hold, the algorithm returns FAIL.

2.

~

If the number of packets in B is at least t, then order the datagrams correctly so the sequence is identical with the one in the source with at most d missing datagrams.

3.

From each datagram extract the contents mi and the corresponding control value R(i).

4.

Find all the hash values hi for the packets from B . Note that at least t hash

5.

~

values are generated directly from mi . Assemble a system of linear equations from the available control values R(i), solve it and determine the redundant message R = (b0 , " , bt −1 ) .

6.

Extract the control values F (i j ) for the missing j and reconstruct the hash values of

7.

missing datagrams. Verify the signature using a native (to signature) verification algorithm and the public key of the sender. If the signature is correct return OK, otherwise exit FAIL.

246

M. Al-Ibrahim and J. Pieprzyk

The only aspect of the second scheme, which needs some clarification, is how the receiver reconstructs the redundant message R or equivalently finds the polynomial R(x). Note that the receiver knows at least t points laying on the polynomial R(x). As the polynomial is of the degree (t-1), any t different points uniquely determine a polynomial, which contains that points. This can be done very efficiently using the Lagrange interpolation.

5

Stream Authentication Based on Combinatorial Designs

In this scheme, combinatorial design methods will be used to distribute message digests in each of the packets in such a way that all message digests are retrieved when at most d packets are lost. Two methods are represented here: 5.1

Balanced Incomplete Block Design

The arrangement of the message digests into the packets uses the combinatorial technique of Balanced Incomplete Block Design (BIBD) [12]. A BIBD (v, b, k, r, λ) is an arrangement of v distinct objects into b blocks such that each block contains exactly k distinct objects, and each object occurs in exactly r different blocks. In BIBD every (unordered) pair of distinct objects occurs together in exactly • blocks. In our case, the objects are the message digests and the blocks are the packets, and the problem is to distribute the v message digests into the b packets in such a way that each message digest appears in r packets and each packet holds k different message digests. By the very definition of BIBD, if up to d = r-1 of such packets are lost, we can still retrieve all the k message digests from the remaining t = v - d received packets. As an example, suppose we have v=7 message digests that need to be distributed over b=7 packets. Then, a BIBD (7, 7, 3, 3, 1) will allow us to retrieve all the 7 message digests from any t=5 of the received packets, as the following listing of the packets shows (the message digests are coded to integers 0…6): P0: 0, 1, 3 P4: 4, 5, 0

P1: 1, 2, 4 P5: 5, 6, 1

P2: 2, 3, 5 P6: 6, 0, 2

P3: 3, 4, 6

This special case when v = b is called the Symmetric Balanced Incomplete Block Design (SBIBD). The necessary condition for this sort of designs is •(v-1) = k (k-1). Since in our applications, the number of message digests are always equal to number of packets, as each packet has a corresponding message digest, we will always exclusively deal with SBIBD in these applications. Note that, it is possible to further reduce the number of message digests in the above example in each packet to 2 messages, since it is possible to compute the message digest of the holding packet directly from the packet itself. The enhancement is as follows: P0: 1, 3 P4: 5, 0

P1: 2, 4 P5: 6, 1

P2: 3, 5 P6: 0, 2

P3: 4, 6

Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques

247

There are many ways for constructing SBIBD designs that is found in the literature and for different choices of parameters. Our choice was focused on the design that yields highest ratio of k to v, i.e. the minimum number of message digests that need to be carried by each packet, relatively to the total number of packets need to be present to authenticate a block. In other words we are looking for high ratio of packet loss while still are able to authenticate the block. Colbourn and Dinitz [13] list over 12 families of SBIBD(v, k ,•) designs for various values of parameters. One of these families refer to Hadamard designs, and they correspond to designs with n n-1 parameters v=2 -1, k=2 -1 and •= n-1. A Hadmard SBIBD design exists only and only if H(4n) exits, where H is a Hadamard matrix of order n x n. The ratio of k to v is high as approximately the half, which means it is possible to authenticate the block in the presence of half of the packets of the block. n To construct a Hadamard matrix for a group of 2 packets, the matrix is normalized nby suitable row and column negations. Removing the first row and column leaves a 2 1 n-1 x 2 matrix , the core of Hadamard matrix. Replace all –1 entries with 0 entries, the n n result is an SBIBD(2 -1, 2 -1, n-1) . The 1 entries actually represents the arrangements of the v entries (message digests) over b (packets). These matrices designs could be prepared according to the proper sizes and selected during the implementation. To n construct such method a number of packets of size 2 are grouped to form a block. n n Then, (choose) Hadamard matrix of order 2 x 2 is constructed. Finally, message digests are assigned to the corresponding packet index in the block according to Hadamard matrix [14]. One advantage of the SBIBD approach is that there is no additional computations overhead cost involved in computing the threshold parameters and retrieving them by sender and receiver respectively. The additional space overhead is minimum compared for to other technique as in [2,3]. 5.2

Rotational Designs

Another dynamic, simple and easy way in which it is possible to control the degree of the threshold is by using Rotational Designs. The following example is the distribution of 6 message digests over a block of 7 packets: Table 1.

Packet number 0 1 2 3 1 2 3 4 2 3 4 5 3 4 5 6 4 5 6 0 5 6 0 1 6 0 1 2

4 5 6 0 1 2 3

5 6 0 1 2 3 4

6 0 1 2 3 4 5

248

M. Al-Ibrahim and J. Pieprzyk

In this distribution, v = b = 7 and k = r = 6. The column represents the packet number and message digests of packets it holds, and the rows represent the message digests distribution over packets. Now, if we want to apply the threshold scheme and require only one space overhead per packet but with high availability then (i.e. one packet loss maximum), then the first row only of Table 1 will be distributed. If however, two message digests are attached to each packet, then maximum two packets are tolerated to loss, therefore the first and the second row distribution will be applied only and so on. The distribution in Table 1 is the worst case and typically the one used in Wong and Lam scheme [3]. Formally speaking, each packet holds the message digests of rest of packets in the block and consequently each block is authenticated individually. Obviously, their solution suffers from space overhead of the message digests, worst when counting the block signature space.

6

Conclusion and Future Work

Multicasting is an emerging communication mode, in which a single sender conveys messages to many receivers. Authenticating of multicast source is a major concern. The problem has been already addressed in a number of proposals. There is no single scenario that fits divers scenarios. In this paper, we first classified these proposals, then we investigated the problem in an unreliable communication environment. Different schemes based on threshold methods have been introduced. The schemes try to rid off the drawbacks of other proposals. Mainly, they have less overhead space and can tolerate packet loss up to a threshold number. The continuation of this work is to develop a fast batch verification algorithm for a digital signature algorithm that considers the order of received packets. Acknowledgment We would like to thank Prof. Jennifer Seberry and Dr. Abdul Hamid Al-Ibrahim for their consultations in the area of Combinatorial Designs.

References 1. 2. 3. 4. 5.

R. Gennaro and P. Rohatchi, “ How to Sign Digital Streams”, CRYPTO’97, Lecture Notes in Computer Science 1249, Springer-Verlag, 1997, pp 180-197 R. Canetti, J. Garay, G. Itkins, D. Micciancio, M. Naor and B. Pinkas, “ Multicast Security: A Taxonomy and some efficient Constructions”, IEEE INFOCOM’99. C. Wong, S. Lam, “Digital Signatures for Flows and Multicasts”, Proceedings IEEE ICNP ’98, Austin TX, Oct 1998. A. Perrig, R. Canetti, J.D. Tygar, D. Song, “ Efficient Authentication and Signing of Multicast Streams over Lossy Channels”, IEEE 2000 online. P. Rohatchi, “ A Compact and fast hybrid signature scheme for multicast packet th Authentication”, In the 6 Conference on Computer and Communications Security, November 1999.

Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16.

249

P. Golle, “ Authenticating Streamed Data in the presence of random packet loss”, extended abstract, internet draft 2000. S. Even, O. Goldreich, S. Micali , “ On-Line/Off-Line Digital Signatures”, Journal of Cryptology, 9(1): 35-67, 1996. J. Pieprzyk, “ A Book in Computer Security “, internet edition, 2000 SMUG web site, http://www.securemulticast.org R. Canetti, B. Pinkas, “A taxonomy of Multicast Security Issues” , August 2000 A. Shamir, “ How to share a Secret” , Communications of ACM; 22: 612-613,Nov97 G. R. Blakley, “Safeguarding Cryptographic Keys”, in the proc. AFIP 1979 National Computer Conference, ^bp. 813- 817. AFIPS 1979. 12 Marshall Hall, “ Combinatorial Theory”, A Wiley-Inter-science Publication John Wiley and sons, 1986 C. J. Colbourn , J. H. Dinitz, “ The CRC Handbook of Combinatorial Designs”, CRC press 1996 Wu-chi Feng, “ Buffering Techniques for Delivery of Compressed Video in video on Demand Systems”, Kluwer Academic Publisher, 1997 L. McCarthy, “ RTP for source Authentication and Non-Repudiation of Audio and Video conferences”, draft-mccarthy-smug-rtp-profile-src-auth-00.txt, May 1999

Tuning of QoS Aware Load Balancing Algorithm (QoS-LB) for Highly Loaded Server Clusters Kimmo Kaario1 , Timo H¨am¨al¨ ainen, and Jian Zhang2 1

Honeywell Industrial Automation & Control Control System Development Ohjelmakaari 1 FIN-40500 Jyv¨ askyl¨ a Finland [email protected] 2 University of Jyv¨ askyl¨ a Faculty of Information Technology Department of Mathematical Information Technology Telecommunication P.O.Box 35, FIN-40351 Jyv¨ askyl¨ a Finland [email protected] and [email protected]

Abstract. This paper introduces a novel algorithm for content based switching. A content based scheduling algorithm (QoS Aware Load Balancing Algorithm, QoS-LB) which can be used at the front-end of the server cluster is presented. The front-end switch uses the content information of the requests and the load on the back servers to choose the server to handle each request. At the same time, different Quality of Service (QoS) classes of the customers can be considered as one parameter in the load balancing algorithm. This novel feature becomes more important when service providers begin to offer the same services for customers with different priorities.

1

Introduction

One well-accepted design principle for the next-generation Internet architecture is to push packet processing complexity to the network edge so that backbone routers can be designed to be simple and operate very fast. However, this architectural decision also places more demanding requirements on edge router designs in that they have to not only forward generic IP packets at a rate scalable with the link speed, but also support a wide array of packet processing functions for value-added services, examples of which range from low-level router implementation enhancements to improve end-to-end performance such as active queue management [16] and congestion state sharing [14], to adding application-specific payload processing such as content-aware forwarding [3] and media transcoding [2]. Consequently, edge routers become I/O-intensive as well as compute-intensive systems. P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 250–258, 2001. c Springer-Verlag Berlin Heidelberg 2001 

Tuning of QoS-LB for Highly Loaded Server Clusters

251

There have been a lot of research that addresses content based switching. Several products are available or have been announced for use as front-end nodes in cluster servers [5,9]. The request scheduling strategies used in the cluster frontends are mostly variations of weighted round-robin, and do not take into account the request’s target content. One of the exceptions is the Dispatch product by Resonate, Inc., which supports content-based request distribution [15]. The product does not appear to use any dynamic distribution policies based on content and no attempt is made to achieve cache aggregation via content-based request distribution. A TCP option designed to enable content-based load distribution in a cluster server is proposed in [8]. The design has not been implemented and the performance potential of content-based distribution has not been evaluated as part of that work. Also, no policies for content-based load distribution were proposed. [7] reports on the cluster server technology used in the Inktomi search engine. The work focuses on the reliability and scalability aspects of the system and is complementary to our work. The request distribution policy used in their systems is based on weighted round-robin. Loosely-coupled distributed servers are widely deployed on the Internet. Such servers use various techniques for load balancing including DNS round-robin [4], HTTP client redirection [1], smart clients [18], source-based forwarding [6] and hardware translation of network addresses [5]. Some of these schemes have problems related to the quality of the load balance achieved and the increased request latency. A detailed discussion of these issues can be found in [8], [9] and [6]. None of these schemes support content-based request distribution. IBM’s Lava project [11] uses the concept of a hit server. The hit server is a specially configured server node responsible for serving cached content. Its specialized OS and client-server protocols give it superior performance for handling HTTP requests of cached documents, but limits it to private Intranets. Requests for uncached documents and dynamic content are delegated to a separate, conventional HTTP server node. Here, we present a content based scheduling algorithm (QoS Aware Load Balancing Algorithm, QoS-LB), which can be used at the front-end of the server cluster. The front-end switch uses the content information of the requests and the load on the back servers to choose the server to handle each request. At the same time, different Quality of Service (QoS) classes of the customers can be considered as one parameter in the load balancing algorithm. The rest of this paper is organized as follows. Chapter two describes our QoS-LB algorithm. In Chapter 3 we present simulation environment and Chapter 4 analyzes obtained results. Finally, Chapter 5 summarizes our main results and gives some ideas to the future work.

2

The Algorithm

In QoS-LB, the algorithm has a strategy that consists of three phases. First, the algorithm tries to find a server that is included in the set of preferred servers for the requested service and its QoS needs. If this kind of server is found and

252

K. Kaario, T. H¨ am¨ al¨ ainen, and J. Zhang

its load is under the limit Thigh (class, service), it is chosen as the server for the requested connection. We have function f (m) to assign each server m a maximal QoS class that it is preferred to serve. By using this function, the set of preferred QoS classes in server m becomes qpref (m) = {1, ..., f (m)} Choosing of relevant function f (m) is one topic of discussion in this paper. In the second phase of the algorithm, i.e. in the case when all the preferred servers are too busy to achieve the requested QoS level, the algorithm tries to find a server that has a load less than Tlow . The limit Tlow must satisfy the rule Tlow < min (Thigh (c, s)|c ∈ C, s ∈ S)

(1)

where C is the set of all supported QoS classes in the server cluster, and S is the set of all the supported services in the cluster. If the first two phases of the algorithm don’t give us the server, the last phase of the algorithm just chooses the least loaded node of the cluster as the server. In the algorithm, the maximal number of concurrent connections to the backend nodes is limited to TS = (mmax − 1) · max(Thigh (c, s)|c ∈ C, s ∈ S) + Tlow − 1

(2)

This limit is very important parameter in QoS-LB. Tuning of TS is another main topic in this paper. In fact, tuning of TS equals to tuning the parameters Tlow and Thigh (c, s) (where c ∈ C and s ∈ S).

3

Simulations

Let M ∈ N be the set of servers in the server cluster, S ∈ N the set of supported services (note that each service must be identified uniquely by a number in this set), and Q ∈ N the set of supported QoS classes in the server cluster (again, QoS classes must be identified by these numbers). If mmax is the number of servers, smax the number of services, and qmax the number of QoS classes, then M = {1, ..., mmax }, S = {1, ..., smax }, and Q = {1, ..., qmax }. Now, we can define f (m) e.g. by using a linear approach       max{1, qmax + −qmax m + qmax }, when mmax ≤ qmax mmax  mmax f (m) = (3)  max{1, −qmax m + qmax }, when mmax > qmax mmax where m = 1, ..., mmax . Here, x means the ceil of x, and x is the floor of x. Linear approach means that the number of preferred QoS classes decreases quite linearly when the server number increases. In some cases, however, there might be need for different weighting between the QoS classes. In this paper, we have also tried a bit different f (m), namely f (m) = min(qmax , max(1, −

m2 qmax + qmax  +  )) 2 mmax

(4)

Tuning of QoS-LB for Highly Loaded Server Clusters

253

In most of the simulations, inter-arrival times were created by using simple Poisson process. The service times were distributed as Pareto process defined by α  β FX (x) = P (X ≤ x) = 1 − ,x > 0 x+β where 0 < α < 2.5 and β > 0. Some of the most important properties for Pareto distribution are that for 0 < α ≤ 1, E(X) = ∞, for 1 < α ≤ 2, E(X) < ∞ and V ar(X) = ∞ and for α > 2, both E(X) and V ar(X) are finite. With Pareto distribution, we can create self-similar service times. In some of the simulations, we also created inter-arrival times to be selfsimilar. The existence of self-similarity in network traffic can be studied in more detail e.g. from [10,13] and [17].

4

Results

In the following, we show a set of simulations that reveal the importance of TS and f (m) in the performance QoS-LB. In Figure 1, we have presented the performance of simple Round-Robin with our simulated, self-similar traffic load. It is used as an reference for an algorithm that is not taking QoS needs or server loads as input parameters. In Figure 2, the performance of LARD [12] is depicted. It is a good reference to a well-known and accepted locality-aware load balancing algorithm. We would like to underline that the aim of this paper is not to directly compare the performance of LARD and QoS-LB, but to show the potential of having QoS information as one input parameter in the load balancing algorithm. This is done by comparing LARD and QoS-LB. Figures 3 and 4 show the cases when parameter Thigh is unsuccessfully dimensioned. In Figure 3 we have used the linear function of Equation 3, and in Figure 4 the unlinear version of Equation 4. The Figures 5 and 6 show the successful cases, respectively. In all the figures, the load on the vertical axis is normalized to the original (unsuccessful) limit of Thigh . When using Equation 3 in Figures 3 and 5, we had qpref (1) = {1, ..., 10}, qpref (2) = {1, ..., 7}, qpref (3) = {1, ..., 5}, and qpref (4) = {1, 2}. In the nonlinear case of Figures 4 and 6, we had qpref (1) = {1, ..., 10}, qpref (2) = {1, ..., 10}, qpref (3) = {1, ..., 8}, and qpref (4) = {1, ..., 5}.

254

K. Kaario, T. H¨ am¨ al¨ ainen, and J. Zhang

As we can see, there is only a small difference on the server loads with different strategy of f (m). Most clearly the impact of f (m) is seen in Figures 5 and 6, where the nonlinear choice of f (m) in Figure 6 loads the Server 4 less than the linear f (m) in Figure 5. The importance of f (m) increases, when we are using the option to set the preferred servers not only by the QoS class of the request but also by the service type of it. This gives us an interesting application of declustering methods - the aim is to assign load between servers unequally while maintaining high cache hit rates. In this case, the complexity of tuning the algorithm increases. The impact of Thigh on the loads is the key factor on the performance of QoSLB. If we choose too small value for Thigh (compared to the current load on the servers), all the servers are equally loaded as in Figures 3 and 4. If we choose too big value for Thigh , all the load will be on the first server when having quite low total load on the cluster. Both of the scenarios do not give us good performance. That is why we are going to implement the algorithm with adaptive tuning of these parameters. You should note that we have implemented the algorithm for these simulations by limiting the maximal number of concurrent sessions by Eq. (2). In real implementations, there is a need for parameter Tmax (m), m ∈ M , to define the maximal request processing capacity in each server. In other words, Thigh (c, s) for all c ∈ C, s ∈ S equals Tmax (m) for all m ∈ M in this paper. This should be kept in mind when analyzing the figures.

Fig. 1. Round-Robin.

Tuning of QoS-LB for Highly Loaded Server Clusters

Fig. 2. LARD.

Fig. 3. Unsuccessful dimensioning of QoS-LB (linear f (m)).

255

256

K. Kaario, T. H¨ am¨ al¨ ainen, and J. Zhang

Fig. 4. Unsuccessful dimensioning of QoS-LB (nonlinear f (m)).

Fig. 5. Successful dimensioning of QoS-LB (linear f (m)).

Tuning of QoS-LB for Highly Loaded Server Clusters

257

Fig. 6. Successful dimensioning of QoS-LB (nonlinear f (m)).

5

Conclusions

In this paper we have developed a new algorithm for distributed computer systems that allows not only load balancing, but also QoS control at each host. As illustrated by the simulations in Chapter 4, our algorithm will lead to significant improvement in system performance. There are several interesting variations of the combined load-balancing and QoS problem that merit further investigation. For example, it may be appropriate to analyze the cache hit rates and find rules for assigning services to preferred servers (in this paper, all the servers were preferred servers for any service). Other important future work will be to study the need for adaptive tuning of Thigh . The methodology introduced in this paper may also give some insight to solving the end-to-end QoS problem in integrated service networks at the server side.

References 1. D. Andresen et al. SWEB: Towards a Scalable WWW Server on MultiComputers. In Proceedings of the 10th International Parallel Processing Symposium, Apr. 1996 2. E. Amir, S. McCanne, R. H. Katz: An Active Service Framework and Its Application to Real Time Multimedia Transcoding. Proceedings ACM SIGCOMM, 1998. 3. G. Apostopoulos, D. Aubespin, V.Peris, P. Pradhan, D. Saha: Design, Implementation and Performance of a Content-Based Switch. Proceedings of IEEE INFOCOM 2000. 4. T. Brisco. DNS Support for Load Balancing. RFC 1794, Apr. 1995. 5. Cisco Systems Inc. LocalDirector. http://www.cisco.com.

258

K. Kaario, T. H¨ am¨ al¨ ainen, and J. Zhang

6. O. P. Damani, P. Y. E. Chung, Y. Huang, C. Kintala, and Y. M. Wang: ONE-IP: Techniques for hosting a service on a cluster of machines. Computer Networks and ISDN System 7. A. Fox, S. D. Gribble, Y. Chawathe, E. A. Brewer, and P. Gauthier: Cluster-based scalable network services. In Proceedings of the Sixteenth ACM Symposium on Operating System Principles, San Malo, France, Oct. 1997. s, 29:1019–1027, 1997. 8. G. Hunt, E. Nahum, and J. Tracey: Enabling content-based load distribution for scalable services. Technical report, IBM T.J. Watson Research Center, May 1997. 9. IBM Corporation. IBM interactive network dispatcher. http://www.ics.raleigh.ibm.com/ics/isslearn.htm. 10. W. Leland, M. Taqqu, W. Willinger and D. Wilson: On the self-similar nature of Ethernet traffic (extended version). IEEE/ACM Tran. Networking, Vol. 2, 1994, pp. 1-15. 11. J. Liedtke, V. Panteleenko, T. Jaeger, and N. Islam: High-performance caching with the Lava hit-server. In Proceedings of the USENIX 1998 Annual Technical Conference, New Orleans, LA, June 1998. 12. V. S. Pai, M Aron, G. Banga, M. Svendsen, P. Druschel, W. Zwaenepoel, E. Nahum: Locality-Aware Request Distribution in Cluster-Based Network Servers. In Architectural Support for Programming Languages and Operating Systems, 1998. 13. V. Paxson and S. Floyd: Wide Area Traffic: The Failure of Poisson Modeling. IEEE/ACM Transactions on Networking, Vol. 3, No. 3, June 1995, pp. 226-244. 14. P. Pradhan, T. Chiueh, A. Neogi: Aggregate TCP Congestion Control Using Multiple Network Probing. Proceedings of ICDCS 2000. 15. Resonate Inc. Resonate dispatch. http://www.resonateinc.com. 16. B. Suter, T.V. Lakshman, D. Stiliadis, A.K Choudhury: Buffer Management Schemes for Supporting TCP in Gigabit Routers with Per-Flow Queueing. IEEE Journal in Selected Areas in Communications, August 1999. 17. B. Tsybakov, N. D. Georganas: On Self-Similar Traffic in ATM Queues: Definitions, Overflow Probability Bound, and Cell Delay Distribution. IEEE/ACM Transactions on Networking, Vol. 5, No. 3, June 1997, pp. 397-409. 18. B. Yoshikawa et al.: Using Smart Clients to Build Scalable Services. In Proceedings of the 1997 Usenix Technical Conference, Jan. 1997.

The Incremental Deployability of Core-Stateless Fair Queuing Yannick Blanpain, Hung-Yun Hsieh, and Raghupathy Sivakumar School of Electrical and Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332, USA [email protected],{hyhsieh,siva}@ece.gatech.edu http://www.ece.gatech.edu/research/GNAN

Abstract. In this paper, we study the incremental deployability of the Core-Stateless Fair Queuing (CSFQ) approach to provide fair rate allocations in backbone networks. We define incremental deployability as the ability of the approach to gracefully provide increasingly better quality of service with each additional QoS-aware router deployed in the network. We use the ns2 network simulator for the simulations. We conclude that CSFQ does not exhibit good incremental deployability.

1

Introduction

The growing diversity of Internet applications has motivated the need for supporting service differentiation inside the network. A real time multimedia application streaming live video, and a file transfer application, require very different network-level quality of service. While today’s best-effort Internet model will not differentiate between the two applications, the Internet is slowly moving towards a pay-per-use model wherein applications can “buy” the specific network-level service they require. Parameters of such a service can include bandwidth, delay, jitter, loss, etc. In recent years, the Internet Engineering Task Force (IETF) has developed two different quality of service (QoS) models for the Internet. While the Integrated Services (intserv) model provides fine-grained per-flow quality of service, it is not considered as a solution for backbone networks due to its inability to scale to a large number of flows [4]. The Differentiated Services (diffserv) model, on the other hand, is scalable at the expense of providing only a coarse-level quality of service that does not support any assurances to individual flows. Of late, newer QoS models that attempt to bridge the scalability of the diffserv model, and the service richness of the intserv model have been proposed [2,3,4,5]. We refer to these new models as Core-Stateless QoS models in keeping with the terminology introduced by the authors of [2]. While the core-stateless approaches offer great promise in terms of both scalability and the service models they can support, not much work has been done in terms of evaluating the feasibility of their practical deployment. Specifically, given the enormous size of the present Internet, any solution requiring replacement of routers in the Internet P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 259–267, 2001. c Springer-Verlag Berlin Heidelberg 2001 

260

Y. Blanpain, H.-Y. Hsieh and R. Sivakumar

has to be incrementally deployable. In the context of quality of service architectures, we define incrementally deployability as the ability to provide increasingly better quality of service with increasing number of QoS-aware routers. In this paper, we study the incremental deployability of core stateless fair queuing (CSFQ) [2], a QoS model that attempts to provide rate fairness without maintaining per-flow state at core routers. The contribution of our work is twofold: (i) We study the performance of CSFQ through simulations, and conclude that it has poor incremental deployability. (ii) Based on the insights gained through our study of CSFQ, we present some “guidelines” for the deployment of an incrementally deployable core-stateless QoS model. The rest of the paper is organized as follows: In Section 2, we provide a brief overview of the CSFQ mechanism. In Section 3, we describe the simulation model, and in Section 4 we discuss the simulation results. In Section 5 we conclude the paper.

2 2.1

Background Core Stateless Fair Queuing

CSFQ attempts to emulate the behavior of fair queuing [1] at core routers without maintaining any per-flow state. Combined with an end-to-end adaptation scheme (like that of TCP), it approximately achieves max-min fairness [4]. We provide a quick overview of the CSFQ mechanism in the rest of the section. CSFQ estimates the fair share of each link without maintaining any per-flow state in the core router. The fair share α at a core router represents the share of the output link capacity that is allotted to each flow that traverses the router. In CSFQ, each packet has the rate r - of the flow to which the packet belongs stamped in its header by the ingress edge router. When the packet arrives at a core router, the router drops the packet with a probability of max{0, 1 − α/r}. If the packet is not dropped, it is accepted for transmission. If A represents the aggregate arrival rate, F represents the aggregate accepted rate (where the two variables are updated after the arrival of every packet), and C represents the link capacity, the fair share α is updated as follows: if (A > C) αnew ← αold ∗ C/F else αnew ←largest rate of any active flow The combination of fair share estimation and probabilistic dropping of packets for those flows whose rate exceeds the fair share enables CSFQ to enforce fair sharing of a link without maintaining any per-flow state in the router. 2.2

Incremental Deployability

In Section 4 we evaluate the incremental deployability of the CSFQ mechanism by studying the fairness properties of a network in which only a fraction of the nodes are CSFQ routers. Specifically, we investigate incremental deployability from two perspectives: the core of the network and the edges. In other words,

The Incremental Deployability of Core-Stateless Fair Queuing

261

we study both the incremental deployment of CSFQ routers in the core of a backbone network (assuming that all the edge routers are CSFQ-aware) and the incremental deployment of CSFQ-aware routers at the edges of the network. For both cases, we use First In First Out (FIFO) routers for the non-QoS aware routers. Note that incremental deployment of QoS-aware routers at the edges can also be seen as increasingly more number of flows in the network being QoS-aware flows. In the rest of the paper, we refer to QoS-aware routers as fair routers and the non-QoS-aware routers as legacy routers. Likewise, we refer to QoS-aware flows as fair flows, and the default flows as legacy flows.

3

Simulation Model

f5,f6

f0,f1

f0−f4 10 Mbps

f2,f3

2 Mbps

5 Mbps

(a) TOPOLOGY 1

2 Mbps 2 Mbps

f5,f6

f6,f7

f7,f8

f4,f5

f0−f4 10 Mbps

5 Mbps

(b) TOPOLOGY 2

2 Mbps

2 Mbps (c) TOPOLOGY 3

Fig. 1. Small Topologies Used For Simulations

We use the ns2 network simulator [7] for our simulations. The ns2 extensions for CSFQ were downloaded from http://www.cs.cmu.edu/˜ hzhang/csfq/. Although several topologies were used for the study, in this paper we illustrate our arguments using results for the 3 simple topologies shown in Figure 1 and the large topology shown in Figure 6. The four topologies are described in the next section. For each of the topologies and for the two scenarios of core and edge deployment, we start from a scenario where all routers use the FIFO scheme. The subsequent scenarios are obtained by incrementally changing one router at a time to use the CSFQ mechanism or be CSFQ-aware, till all the routers in the scenario are changed. For each of the scenarios, we measure the fairness offered by the network as a whole. We use Jain’s fairness-index to demonstrate the

262

Y. Blanpain, H.-Y. Hsieh and R. Sivakumar

fairness achieved among the flows in the network in terms of their end-to-end throughput. We plot the fairness index against the configuration of the network defined by the number of CSFQ (or CSFQ-aware) routers. Topology 2: Edge Incremental Deployability

Topology 1: Core Incremental Deployability 1

1 0.9

Fairness Index

Fairness Index

0.95

0.9

0.85

0.8

0.75

0.8 0.7 0.6 0.5

0

1 Number of Csfq Routers

2

Fig. 2. Topology 1: Core Incremental Deployability

0.4 All

6

4 Number of Fifo Flows

2

0

Fig. 3. Topology 1: Edge Incremental Deployability

The fairness-index plotted is an average over multiple simulations using the same number of QoS-aware routers, but with different placements for the QoSaware routers. The flows use UDP and the traffic is generated using Poisson distribution. The labels on the x-axis of the graphs represent the number of QoS-aware routers used. The fairness-index is plotted on the y-axis.

4 4.1

Simulation Results Simple Topologies

Figures 2, 4, and 7 show the fairness demonstrated by CSFQ when CSFQ routers are incrementally deployed in the core for Topologies 1, 2, and 3 respectively. Figures 3, 5, and 8 show the fairness when CSFQ-aware routers are incrementally deployed at the edges. As can be seen from Figures 2, 4, and 7, CSFQ does not exhibit good incremental deployment when being deployed in the core of the network. Note that each datapoint in the graphs shown was averaged over multiple simulations for all possible configurations with that many number of CSFQ routers. For example, in Figure 2, the second datapoint represents the average of the fairness indices for the two possible configurations (CSFQ-FIFO and FIFO-CSFQ) of Topology 1 with one CSFQ router. Also, for each possible configuration, simulations were run with varying rates for the flows, and an average taken over all the simulation runs. Similarly, from Figures 3, 5, and 8, it can be observed that CSFQ does poorly in terms of edge router incremental deployment. As mentioned earlier,

The Incremental Deployability of Core-Stateless Fair Queuing

263

Topology 2: Edge Incremental Deployability

Topology 2: Core Incremental Deployability

1

1

0.9

0.95

0.8 Fairness Index

Fairness Index

0.9 0.85 0.8 0.75

0.7 0.6 0.5 0.4 0.3

0.7 0.65

0.2 0

1 2 Number of CSFQ Core Routers

All

Fig. 4. Topology 2: Core Incremental Deployability

0.1 All

8

6 4 Number of FIFO Flows

2

0

Fig. 5. Topology 2: Edge Incremental Deployability

with fewer number of CSFQ-aware routers at the edges, the number of CSFQaware flows in the network decreases. Hence, the unfairness stems from CSFQ flows sharing links with best-effort flows (legacy flows) in the core of the network. An interesting aspect of the results shown in the figures is the “dip” in the curve for all the scenarios. Specifically, the fairness index goes down with increasing number of fair-routers at the edges and rises only when all the edge routers are fair-routers. This anomaly can be explained as follows: When legacy-flows share a congested CSFQ link with fair-flows, CSFQ will be significantly unfair toward the fair-flows: When the fair share estimate is initially reduced, CSFQ will not observe any reduction either in the arrival rate (because legacy-flows cannot be assumed to adapt to fair share estimates). This will result in a further reduction in the fair share estimate. However, since the rate of the legacy-flows by itself is more than the link capacity, the presence of sustained congestion will ensure that the fair share estimate is cut down to zero, at which stage none of the packets belonging to the fair-flows will be accepted. However, if all the flows on a CSFQ link happen to be legacy-flows, “better” fairness can be expected as CSFQ will not interfere on behalf of any particular flow, leaving it for the indiscriminate (but not unfair) allocation of the drop-tail mechanism to decide the per-flow shares. Hence, it can be observed that the fairness achieved when there are no fair-flows in the network is better than the intermediate cases. 4.2

Large Topology

For the results shown in Figures 9 and 10, the topology shown in Figure 6 was used. All link capacities were set to 10Mbps. Each core-router in the topology was connected to exactly one edge-router. Simulations were performed with 1100 flows. Each edge-router serves as an ingress for 100 flows. The 100 flows at an ingress-router is divided into 10 sets of equal number of flows, each set having a unique egress-router among the other 10 edge routers. The rate of each flow was

264

Y. Blanpain, H.-Y. Hsieh and R. Sivakumar

45 Mbps DS−3 Sprint Backbone

Fig. 6. Topology 4 - Sprint Backbone

set to 200 kbps. Although, simulations were performed using other flow rates, we do not present them here for lack of space. The results demonstrate that even for more realistic topologies, CSFQ performs poorly in terms of incremental deployability, both at the core and at the edges. Topology 3: Edge Incremental deployability

Topology 3: Core Incremental Deployability

1

1

0.9

0.95 Fairness Index

Fairness Index

0.8 0.9

0.85

0.7 0.6 0.5

0.8

0.75

0.4 0

1

2 Number of CSFQ Core Routers

3

All

Fig. 7. Topology 3: Core Incremental Deployability

4.3

0.3 All

6

4 Number of FIFO Flows

2

0

Fig. 8. Topology 3: Edge Incremental Deployability

Discussion and Insights

Our simulation results demonstrate that CSFQ is not an incrementally deployable approach to achieve fair rate allocation. However, the following insights can be gathered from conducted study:

The Incremental Deployability of Core-Stateless Fair Queuing Sprint Backbone: Edge Incremental deployability

1

1

0.9

0.9

0.8

0.8 Fairness Index

Fairness Index

Sprint Backbone: Core Incremental Deployability

0.7 0.6

0.7 0.6

0.5

0.5

0.4

0.4

0.3

0

1

2

3

4 5 6 7 Number of Csfq Core Routers

8

265

9

10

All

Fig. 9. Topology 4: Core Incremental Deployability

0.3

0

1

2

3

4 5 6 7 Number of Csfq Edge Routers

8

9

10

All

Fig. 10. Topology 4: Edge Incremental Deployability

Impact of Legacy Core Routers The impact of the presence of legacyrouters on the performance of fair-routers depends upon the specific allocation scheme employed at the fair-routers. In core-stateless approaches, fair allocation of link bandwidth at core routers is achieved by making use of dynamic state information about the flows. Edge routers pass the dynamic state to core routers through varying schemes including fields in the packet headers (dynamic packet state) [2], or specialized packets in the flow (dynamic flow state) [4]. The core routers rely solely on the dynamic state carried by the flow, and hence do not perform any per-flow processing. However, in the presence of legacy-routers, such approaches encounter the following problems that adversely affect the fair service they offer: – Legacy-routers drop packets indiscriminately1 . Hence, flows traversing such routers will inherently receive unfair service. While this by itself cannot be completely overcome, it leads to unfair service even at fair routers. We elaborate upon this phenomenon next. – While legacy-routers drop packets indiscriminately, being unaware of the fair allocation scheme, such routers will, in addition, fail to update the dynamic state of flows when dropping packets. Hence, the dynamic state at downstream fair routers can be inconsistent with the actual flow state. When fair routers use such inconsistent dynamic state to perform rate allocation, the allocation will be unfair. – While the unfair allocation because of inconsistent state can be plausibly perceived as a transient phenomenon (if edge routers are assumed to adapt to the fair share feedback they receive, it can be shown that flows will eventually receive their fair allocations at the fair routers), this is true only if the unfair allocations at the drop-tail routers remain stable. In other words, given an arbitrarily indiscriminate rate allocation at legacy-routers, that fluctuates 1

Recall that we have assumed the use of the drop-tail mechanism at legacy-routers.

266

Y. Blanpain, H.-Y. Hsieh and R. Sivakumar

with time, the fair share computation at fair routers will fail to converge, causing unfair allocation at fair routers to become a persistent phenomenon. Impact of Legacy Edge Routers While core routers are responsible for fair allocation, edge routers in core-stateless approaches are responsible for conveying to the core routers, the dynamic state used in their rate allocation schemes. In the event that an edge router is a legacy router, it will fail to convey any such dynamic state information to the core. Hence, the presence of such edge routers will result in legacy-flows co-existing with fair-flows in the core network. While this does not have any impact on legacy-core-routers (where no fair allocation schemes exist anyway), it obviously has a severe impact on the fairness achieved at fair-routers. Specifically, given that the legacy-flows carry no dynamic state, how should the fair routers treat the legacy-flows? Aggregating all legacy-flows into one logical flow might result in unfair allocations to legacy flows. A traffic engineering solution (wherein, the capacity of the network is partitioned between legacy- and fair-flows) might be possible, but would not be desirable in a payper-use service model [8]. The challenge then is to determine dynamically how the capacity at a fair router should be divided between legacy and fair-flows. Once the split is determined, it is sufficient to then provide fairness only among the fair-flows (within their allocation), as the legacy-flows do not expect any fair allocation in the first place. However, it is critical for legacy flows not to be penalized in any way due to the upgrade of a part of the network2 .

5

Summary

We study the incremental deployability of the core-stateless fair queuing (CSFQ) mechanism. Based on our simulations, we conclude that CSFQ is not incrementally deployable. However, to be fair to its authors, CSFQ was not designed to be incrementally deployable [2]. Our motivation for the study was to gain insights that can help in the design of an incrementally deployable core-stateless QoS model. We present some of the insights in Section 4. Acknowledgments We thank the Yamacraw organization (http://www.yamacraw.org) for their generous support and funding part of this work.

References 1. H. Zhang, “Service Disciplines For Guaranteed Performance Service in PacketSwitching Networks”, Proceedings of the IEEE, 83(10), Oct 1995.. 2

Note that we perceive “unfair allocation” and “indiscriminate allocation” differently, with the former being clearly more undesirable than the latter.

The Incremental Deployability of Core-Stateless Fair Queuing

267

2. I. Stoica, S. Shenker, H. Zhang, ”Core-Stateless Fair Queuing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High Speed Networks”, Proceedings of ACM SIGCOMM, 1998. 3. I. Stoica, H. Zhang, “Providing Guaranteed Services Without Per Flow Management” Proceedings of ACM SIGCOMM, 1999. 4. R. Sivakumar, T. Kim, N. Venkitaraman, and V. Bharghavan, “Achieving Per-flow Rate Fairness in Core-Stateless Networks”, Proceedings of International Conference on Distributed Computing Systems, 2000. 5. T. Kim, R. Sivakumar, K-W. Lee, and V. Bharghavan, “Multicast Service Differentiation in Core-Stateless Networks”, Proceedings of International Workshop on Network Group Communication, 1999. 6. Rossi, H. Peter, J. D. Wright, and A. B. Anderson, “Handbook on Survey Research”, 1983. 7. K. Fall and K. Vardhan, “ns notes and documentation,” available from http://wwwmash.cs.berkeley.edu/ns/, 1999. 8. Lucent Technologies, “Network Quality of Service: Survey Report,” .

A New IP Multicast QoS Model on IP Based Networks Hussein Sherif Eissa and Tarek Kamel Electronics Research Institute, Computers & Systems Dept., El-Tahrir st., Dokki, 12622, Cairo, Egypt [email protected], [email protected]

Abstract. In this paper, a new proposed QoS (Quality of Service) model has been presented for the MS NetMeeting videoconferencing application on IP based networks. It saves more than 44% of the consumed bandwidth, and 72% of the consumed buffers inside the core routers than the Qbone model. Section 2.2, presents the packet capturing experiment for the MS NetMeeting to design the inputs’ generators. Sections 3.1 and 3.2 highlight on the architecture and the implementation of the new proposed model. Section 4, discusses different simulation scenarios applied to this model and the results obtained. Section 4.1 describes the No Loss real-time meter design. Sections 4.2 and 4.3 present the aggregation, and IP Multicast results from node delay and bandwidth/buffers savings points of view. Finally, sections 5 and 6 summarize the model performance analysis and the future work that should be done to modify this model.

1 Introduction Real-time traffic creates the environment of sensation and integration where text, images, audio and video integrate and act together to give a high degree of visualization. To enhance the quality of received audio/video streams the delay, the packet loss, and the MTU (Maximum Transfer Unit) should be minimized, but this needs a huge amount of bandwidth and buffers. So, there is a trade off between the real-time applications requirements and the network resources requirements and should be compromised. The Diffserv. (Differentiated services) Model [1] is a scalable model, using simple blocks, but it does not make any assumptions on the Packet Loss values, Queuing Delay, and Jitter Delay. So, there is a trend to design a simple, scaleable, and delay-sensitive model that provides acceptable quantified values for the Packet Loss, Queuing Delay, and Jitter Delay in order to maintain an expected quality level of the audio/video streams across the IP based Networks but with an acceptable consumed amount of the bandwidth and buffers (networks resources saver) specially at the core routers in which the congestion usually occurs.

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 268–276, 2001 © Springer-Verlag Berlin Heidelberg 2001

A New IP Multicast QoS Model on IP Based Networks

269

2 MS NetMeeting Videoconferencing Application Characteristics 2.1 Overview It has been discovered that audio and video streams could not be represented by an exponential PDF curves as the most data streams across the Internet. So, in this paper, the MS (Microsoft) NetMeeting v.2.11 application [2] has been used as an example of the audio/video streams source across the Internet to have the required packet size, and packet inter-arrival PDF curves. 2.2 Packet Capturing Experiment The Packetboy Analyzer Software [3] has been used to capture the audio/video packets, which were sent between two fully equipped PCs inside the same Ethernet (UPENN. Multimedia Lab.). The Packetboy analyzer/decoder Analyzer Package is a complete real-time visual Internet/LAN network monitor suite. Multiple captures can be loaded concurrently and packet traces can be loaded and saved to disk. The inputs of the NetMeeting Software were Speech, Audio, and still/moving person video. Then the capture process has been done on assigned filter at the Analyzer Software to capture the generated packets from the MS NetMeeting (link between source address and destination address). In this experiment, the packets have been captured between the destination address (IP: 130.91.61.2, Ether: 00:80:3e:79:6b:e4) and the Source address (IP: 130.91.62.2, Ether: 00:50:04:78:59:fe) by using protocols of Ethernet/IP/UDP/data. The experiment has been done for 20 times each for 10 minutes with different inputs (speech, played audio file, video of still/moving person). From the previous, it is found that both audio and video packets were sent on the top of the UDP, and two different source/destination ports. Also, it was found that, the audio packet size is constant, and the audio inter-arrival time variance between the packets is having a small value. But, for the video, the packet size and the inter-arrival time are varying with greater values than the audio packets. So, the audio/video packet size/packet inter-arrival time PDF curves could be presented.

3 A New IP Multicast QoS Proposed Model 3.1 The Model Architecture The new proposed model guarantees the required quality by using some of the Diffserv Simple blocks at edge devices only (to decrease the core routers’ overheads). In this model, only three types of traffics are proposed; the real-time traffic, the nonreal-time traffic, and the best-effort traffic (instead of AF and EF [4],[5],[6]). This model relies on metering the input traffics, then police the out-of-profile one by dropping it in case of real-time streams, and shape it in the case of the non-real-time streams. The model architecture is represented as shown in figure 1. It also, uses the IP Multicast mechanism [7] to save more networks resources. So, each sender in this model must support the IP Multicast mechanism.

270

H.S. Eissa and T. Kamel

RST Marker

Mrouter

RTS Meter Dropper

Application Classifier

NRTS Marker

BA Classifier

NRTS Meter Shaper/ Re-marker

BE Marker

Fig. 1. A New Proposed Model Architecture. - Application Classifier: It classifies the streams based on the used applications. For example, if the used application is a Videoconferencing application (such as MS NetMeeting), then it passes the packets to the RTS Marker to mark it with real-time applications codepoint, and if the used application is a Web Browser, then it passes the packets to the BE (Best-Effort) Marker to mark it with the Best-Effort codepoint. - Marker: Based on the used application, it marks the packets with three different values in the precedence field (3 bits) located inside the TOS (Type Of Service) field in the IPv4 [7]. Then the Markers pass the packets to the BA Classifier. -Meter: The meter here (RTS, or NRTS) does not delay the incoming packets, but it checks if it is conformed to some defined traffic profile or not. It relies on the No-queue single token bucket measurement mechanism [8], which controls the rate and the burstness of data transfers into the network. In this token bucket (but without the packet queue), the tokens are inserted into the bucket with token generation rate (r) in kb/s. The depth of the bucket is the burst size (b) in bits. When the traffic arrives at the bucket, if sufficient tokens are available then the traffic is said to conform/In-profile and the corresponding number of tokens are removed from the bucket. If insufficient tokens are available then the traffic is said to exceed/Out-of-profile. -Dropper: The dropper here is acting as a policer to RTS exceed/Out-of-profile packets. It drops them immediately and sends an Error_Drop message to the source Application to readjust the traffics settings to the defined traffic profile. -Shaper/Re-marker: The shaper/dropper block gets the NRTS exceed/Out-of-profile packets. It delays the incoming packets to change the status of these packets from exceed/Out-of-profile to conform/In-profile by using a Single token bucket mechanism [8]. Then the packets will be re-marked with the Best-Effort precedence value (0) and send back an Error_Drop message to the source Application to re-adjust the traffics settings.

A New IP Multicast QoS Model on IP Based Networks

271

-BA Classifier (inside the Mrouter): The Classification is based on the value of the precedence field only. So, it classifies the outgoing packets into the same three categories: RTS, NRTS, and BE. Then the Classifier, as shown in the figure 1, passes the RTS packets to highest priority queue, the NRTS packets to the medium priority queue, and the BE streams to the lowest priority queue at the Mrouter. Note that the priority queuing has been used, because of its simplicity, and scalability. 3.2 The Model Implementation. In this paper, for simplicity, only the RTS, and BE blocks has been considered, because the scope here only at the Real-time streams, and NRTS queue approximately will not affect RTS which have the highest priority queue at the Mrouters. To implement the new proposed model, the OPNET MODELER Network Simulator version 6.0 [9] has been used. After having the PDF curves (as shown at section 2.2), the OPNET PDF Editor has been used to draw these curves. The Packet Generator in the Node Editor has been used to create the audio/video packet generators. The generator’s generation rate attribute, generation distribution attribute, average packet size attribute, and packet size distribution attribute must be set in the generator module. The inter-arrival PDF attribute has been used to set the interarrival times of generated packets to be audio/video Inter-arrival distribution. The pk size pdf attribute has been used to set the size of generated packets to be audio/video Packet Size distribution. For the Mrouter implementation, the process model attribute will be set to Priority Queuing and the service_rate attribute will be set to the value of reserved bandwidth to the RTS streams. At last, the subqueue attributes will be used to set one new queue (for the BE streams).

4 Simulations Scenarios Results 4.1 RTS Meter Design In this section, it is desired to find out the r and b values for the audio/video generators that will give an acceptable packet loss and consumed resources. - Audio Meter Design The following are MS Net-meeting audio rates: Peak rate = 23.11 kb/s, Average rate = 19.72 kb/s, and Minimum rate = 17.83 kb/s. From the previous, the Qbone model reserves bandwidth equals to 23.11kb/s (peak rate) [10]. So, the following simulation scenarios are trying to prove that it should take less than the above values to save considerable amount of reserved resources. The simulation scenarios are depending on generating the audio streams from the Audio Generator and pass them to the Meter block. As shown in table 1, the result for the first scenario has Packet Loss equals to 0% with average values of both r and b.

272

H.S. Eissa and T. Kamel Table 1. Simulation Scenarios results for the audio Meter.

r (bits/sec) 19,500 19,400 19,00

b (bits) 624 624 624

Packet Loss 0 5.132E-3 (not acceptable) 2.565E-2 (not acceptable)

- Video Meter Design The following are MS Net-meeting video rates: Peak rate = 282.61 kb/s, Average rate = 167.73 kb/s, and Minimum rate = 94.6 kb/s. Two groups of simulation scenarios have been implemented. The first group has set the values of token generation rate equals to the average rate (fixed), and has increased the bucket size from the average to the maximum by 10% for each step. As shown in figure 2, it is clear that, the packet loss is improving, but by the end of the simulations (at the maximum acceptable bucket size) the value of the packet loss equals to 4%, which is not acceptable (should be equal or less than 1E-3). 30 25 20 Packet Loss %

15 10 5 0

9.6

10.62

10.8

11.04

11.28

11.52

12.48

b (kb)

Fig. 2. Group_1: Video Meter Simulation Scenarios.

The Second group has set the values of the bucket size equals to the average rate and has increased token generation rate from the average to the maximum acceptable value by 10% for each step. As shown in figure 3, the desired value of the token generation rate equals to 216,667 bits/sec that gives 0% packet loss. 30 25 20 Packet Loss % 15

10 5 0

160

180

188

196

204

212

r (kb/s)

Fig. 3. Group_2: Video Meter Simulation Scenarios.

217

A New IP Multicast QoS Model on IP Based Networks

273

This solution (others could be found) saves around 23.4% of the reserved bandwidth and saves also 57.4% of reserved buffers than the values of the Qbone model [10]. 4.2 Different Aggregations Scenarios In this group of scenarios (50 scenarios), audio/video streams have been generated from 10 similar nodes. This paper presents Saved Bandwidth percentage, Node delay, and Node Buffer consumption statistics. The input traffics have been aggregated into every node, as shown in figure 4. Note that for example, scenario_30 means for example; 30 audio streams, 30 video stream, and 30 BE stream have been used.

Fig. 4. OPNET diagram for the 10 similar nodes.

-Bandwidth Savings As shown in figure 5, it is found that the bandwidth saving percentages are increasing from scenario_2 to scenario_5 then it reach a saturation level at which it ends at the saving percentage equals to 21%. The scenario_1 saves 0% of consumed bandwidth. 21 20.5 20 B.W. Saving % 19.5 19 18.5 18 2

3

4 Scenarios

Fig. 5. Bandwidth savings

5 to 50

274

H.S. Eissa and T. Kamel

-Node Delay Figure 6 represents the minimum/maximum of the node delays values during all the simulations with number of different aggregations. The value of node delay is decreasing by increasing the aggregations. Also, it clear that the node delay value is aggregation position dependent. 25 20 Node Delay 15 (msec.) 10

Min.

5

Max.

0

1

3

5

7

9

15

25

35

45

Aggregation

Fig. 6. Node Delay ranges.

-Buffers Consumption Table 2 represents the of required buffers (buffer size= 1500 bytes) with number of different aggregations. The value of buffer consumption is increasing by increasing the number of aggregations. Also, it is clear that the buffer consumption value is aggregation position dependent. Finally, the new proposed model is saving more than 72% of consumed buffers than the Qbone model. Table 2. Required Buffers inside the core routers.

Aggregations (Audio+ Video) 1-10 11-20 21-30 31-40 41-50

Min. required buffers 1 1 2 2 2

Max. required buffers 3 5 7 9 11

Av. required buffers 2 3 5 6 7

Min. buffers Saving % 72% 83% 86% 87% 88%

4.3 IP Multicast Scenarios In this section, 12 simulation scenarios (6 for Unicast, and 6 for Multicast) have been described to study the advantages and the disadvantages of the IP Multicast mechanism usage on the proposed model. In this group of simulations, each real-time session (videoconference event) consists of 10 subscribers (In this example, Unicast Streams consume bandwidth 10 times more than the Multicast streams). -Node Delay: From table 3, it is clear that the Unicast mechanism is better at the Node delay values than the Multicast mechanism. This is due to the reserved bandwidth amount for the Unicast is 10 times the bandwidth reserved for the Multicast. But, it is found also that, by increasing the number of sessions, the Multicast mechanism improves the values

A New IP Multicast QoS Model on IP Based Networks

275

of the Node delay. This means that the new proposed model will act better and better by having more and more Multicast sessions. Table 3. Node delay for both Multicast and the Unicast Mechanisms

Multicast (msec.) 1 Session 2 Sessions 3 Sessions 4 Sessions 5 Sessions 6 Sessions

22.6 16.4 11.2 8.4 6.9 5.7

Unicast (msec.) 3.8 1.9 1.3 1 0.8 0.6

Unicast Saving (msec.) 18.8 14.5 9.9 7.4 6.1 5.1

N.B.: The savings in the Node delay does not matter, because it is lower than the limit of losing the packet (too late to be played back). So, the saving here will not be an effective factor in the real-time streams performance. -Buffer consumption: From table 4, it is clear that the Unicast aggregations are facing serious problems from the buffer consumption point of view. The Multicast mechanism is saving much more buffers than the Unicast mechanism. This means that, the Unicast mechanism will consume all the available buffers by having a small number of real-time sessions (specially if it has larger number of contributors). Table 4. Buffer Requirements for both Multicast and the Unicast Mechanisms.

1 Session 2 Sessions 3 Sessions 4 Sessions 5 Sessions 6 Sessions

Multicast (No. of buffers)

Unicast (No. of buffers)

Multicast buffers Saving %

1 1 1 2 2 2

3 5 6 8 10 11

66.7% 80% 83.4% 75% 80% 81.8%

5 Summary and Conclusions In general, by adding more aggregations, the values of the Node delay are decreasing and the values of the Buffers consumption from node-to-node point of view are decreasing, but from scenario-to-scenario are increasing by slight normal values. It needs on the average, only 1 extra buffer for each extra 10-audio/video sessions (i.e. it could support up to 380-audio/video NetMeeting sessions at the same time by consuming only 40 buffers at any core router). Also, this model has zero packet loss, and it saves 44.4% of consumed bandwidth (23.4% from the Meter design and 21% from the aggregations) and more than 72% of consumed buffers more than the Qbone model.

276

H.S. Eissa and T. Kamel

So, as a conclusion, this model is network resources (Bandwidth, and Buffer consumption) saver, and has an acceptable Node delay, and zero packet loss for the audio/video NetMeeting traffics. But, it is more complex than the Qbone model, because of its input traffic analyzing stage that should be done before using the new proposed model. Also, in this model, the Best-Effort traffics may suffer at high QoS traffics load case. But, the Buffers consumption savings and the load balance ratios between QoS and Best-Effort traffics (40% for QoS, and 60% for the BE) should decrease the probability of losing Best-Effort packets at the core routers.

6 Future Work Basically, there are some different directions to modify the proposed model in the future. The first is to have a routing protocol, which it should concern with the IP Multicasting mechanism and the QoS parameters. This protocol should route the packets dynamically instead of having static routing technique. The second is to implement a cost function, which will help to have an optimal design for the Meter (single token bucket) parameters (r & b). The third that this model needs more input traffics generators (real-time and non real-time applications) to be studied and analyzed. After having such generators, a more general formula could be concluded from bandwidth/buffers savings points of view. Finally, the load balance ratios between the QoS traffics and Best-Effort traffics should be re-calculated to have an optimal ratio that should not suffer the Best-Effort traffics.

References 1.

S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss: An Architecture for Differentiated Services. RFC 2475, December 1998. 2. MS NetMeeting Application Web site: http://www.micosoft.com/windows/netmeeting 3. Packetboy Analyzer Software Web site: http://www.ndgsoftware.com/ 4. K. Nichols, S. Blake, F. Baker, D. Black: Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers. RFC 2474, December 1998. 5. J. Heinanen, F. Baker, W. Weiss, J. Wroclawski: Assured Forwarding PHB. RFC 2597, June 1999. 6. V. Jacobson, K. Nichols, K. Poduri: An Expedited Forwarding PHB. RFC 2598, June 1999. 7. Douglas E. Comer: Internetworking With TCP/IP: Principles, Protocols, and Architecture. 3rd edn. Prentice-Hall, 1995. 8. Andrew S. Tanenbaum: Computer Networks. 3rd edn. Prentice-Hall, 1996. 9. OPNET Software Web site: http://www.mil3.com/ 10. Ben Teitelbaum: Qbone Architecture. Internet 2, QoS Working Group, May 1999.

Acknowledgment Special thanks to Prof. M. El-Zarki, and Prof. R. Guerin for the support and help during the implementations of the experiments and the simulations at Multimedia & Networking Lab., EE Dept., University of Pennsylvania, USA.

Integrated Management of QoS-Enabled Networks Using QAME Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco, Márcio Bartz Ceccon, Maria Janilce Bosquiroli Almeida Federal University of Rio Grande do Sul – UFRGS – Institutes of Informatics Av. Bento Gonçalves, 9500 – Block IV – Porto Alegre, RS – Brazil {granville, liane, ceccon, janilce}@inf.ufrgs.br

Abstract. Providing QoS-guaranteed services in current installed networks is an important issue, but only the deploying QoS services is not enough to guarantee their success: QoS management must also be provided. Nowadays, police-based management addresses this need, but such management is not enough either. Network managers often deal with QoS tasks that cannot be performed using only policy-based management. This paper describes six important QoS management-related tasks (QoS implementation, operation maintenance, discovery, monitoring, analysis and visualization) and shows solutions that can help managers proceed with these tasks. Unfortunately, these solutions are independent from each other, leading to a scenario where integration is difficult. To solve this lack of integration, QAME (QoS-Aware Management Environment) has been developed. QAME provides support to allow the execution of the defined QoS tasks in an integrated fashion. Keywords: QoS management, policy-based management, management environment

1

Introduction

The great majority of today’s networks operate based on a best-effort approach. There is no warranty concerning traffic delay, jitter and throughput. Several applications operate properly on this environment, but several others can only be delivered if network QoS (Quality of Service) warranties are present. Managers should be aware of QoS features implemented on the network. QoS architectures can only be effective and provide guaranteed services if QoS elements are adequately configured and monitored. Thus, in addition to the management of traditional elements (router, switches, services, etc.), managers must also manage QoS aspects. In this scenario, it’s not a surprise to realize that the overall management will be more complex. Effective QoS management can only be achieved if QoS management tasks are properly identified. Based on these tasks, management mechanisms can be defined to help managers to deal with QoS elements. Besides, such mechanisms must allow the replacement of the current device-oriented management approach by a networkP. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 277–290, 2001 © Springer-Verlag Berlin Heidelberg 2001

278

L. Zambenedetti Granville et al.

oriented approach. This approach replacement is necessary because the amount of management information is even greater when QoS-related data are present. Devicespecific management takes too long and does not provide a global view, which is specially needed when monitoring QoS parameters in critical flows. QoS management must also take place within the same environment used to manage standard network elements. Management platforms should be aware of QoS to help managers proceed with QoS related tasks. Unfortunately, today’s management platforms are not QoS-aware and managers have to investigate each QoS-enabled device to check QoS parameters. Again, a network-oriented approach is needed, with features that explicitly present QoS information to managers in an intuitive fashion. This work presents our ongoing QoS management project named QAME (QoSAware Management Environment). The paper shows current analysis on QoS tasks and related software developed. The final goal is to provide an environment where managers are able to deal with explicit QoS information in a higher abstraction level, and with a global network view, implementing the network-oriented approach mentioned before. The paper is divided as follows. Session 2 presents QoS-related tasks that should be performed to allow the deployment and maintenance of QoS architectures. Session 3 introduces our proposed environment. Finally, session 4 concludes the paper and also shows future works to be developed.

2

QoS Management-Related Tasks

QoS-enabled networks can only present reliable QoS services if managers are aware of QoS. Each network can use one or more QoS solutions and protocols. For instance, one could use MPLS [1] within an administrative domain, and have agreements with neighboring domains using DiffServ [2]. Another could use RSVP [3] to dynamically reserve network resources for a scheduled videoconference. Every QoS-related element (routers, brokers, hosts, classifiers, markers, etc.) must be managed to guarantee proper QoS service operation. In order to manage QoS elements, managers must perform several tasks, besides the tasks applied to traditional management. QoS-related tasks must be performed by using facilities provided by the network management environment, but today’s platforms do not provide any explicit QoS facility. To start providing such facilities, firstly we need to identify QoS tasks and then check how facilities should be created to help QoS management. Thus, we have classified QoS management tasks as described in the following sub-sessions. 2.1

QoS Installation

We call “QoS installation” the task of choosing QoS solutions and installing such solutions into a network. The result of QoS installation is a QoS-unique architecture that provides QoS services to a particular network. The resulted QoS architecture is a

Integrated Management of QoS-Enabled Networks Using QAME

279

collection of QoS solutions and protocols that, together, offer services to network users. Nowadays, the main QoS solutions offered are those developed under IETF: MPLS, DiffServ and IntServ [4]. Actually, each solution can be deployed by using different configurations. For instance, one could use bandwidth brokers [5] to allow dynamic DiffServ resource reservation. Another could use DiffServ with no brokers installed on the network. There is a need for software that advises managers about possible QoS solutions, configurations and problems. One solution can be appropriate for a particular network, but totally inappropriate for another network. The final architecture must result from the analysis of the following elements: -

Network topology. Each network has a particular topology and for each topology a particular architecture is more suitable; Network traffic. Even with identical topologies, each network faces different traffic. One could have more downstream than upstream traffic, or more internal than external traffic; Network application priorities. Network traffic is mainly generated by applications (network itself doesn’t generate too much traffic). The level of desired application priorities vary from network to network; Network available solutions. The final architecture can only be applied if selected solutions are supported by network devices. Otherwise, the final architecture has to be computed again.

Deriving the final architecture could be helped by QoS simulation solutions. Managers would describe its network topology, traffic and application priorities, and start checking each available solution. Different solutions could exist in the same environment at the same time, to collaborate with each other. For instance, a manager could use RSVP reservation internally and DiffServ on the network boundaries. After deciding on a final architecture to be used, managers should start configuring devices, changing inappropriate ones, updating software on others, etc. Such procedures can be done in two different ways: locally or remotely. Local procedures are time consuming. Thus, we must provide tools able to keep local procedures minimal. Configuring and updating software can be remotely done on almost all cases. Except for IP number configuration and a few other operations, configuration is remotely driven, mainly through Telnet command line interface, HTTP in modern devices, and by using SNMP [6] agent/manager interaction. Changing equipment is an intrinsically local operation, and cannot be done remotely. 2.2

QoS Operation Maintenance

After QoS architecture is defined and installed, QoS services are ready to be offered to network users. At the same time QoS architecture is serving user needs, the manager must define appropriate operational parameters. We qualify any procedure taken to define QoS service behavior “on the fly” as “QoS operation maintenance”.

280

L. Zambenedetti Granville et al.

Procedures often taken in QoS operation maintenance are those related to traffic classification, marking and prioritizing. Bandwidth static reservation, SLAs management [7] and policing are also examples of operation maintenance. Today, the promising solution in QoS operation maintenance is policy-based QoS management. By using policies, managers can determine, at a higher abstraction level, how the QoS architecture should proceed to meet a desired behavior. Policybased management actually constitutes a whole architecture itself, with dedicated elements (PEP and PDP [8], for instance). One important procedure in policy-based management is, for example, the location of policy enforcement points. Tools should also help managers in defining such points. 2.3

QoS Discovery

Some network equipment is overfilled with features. It is not rare to see complex routers with several services being used only for packet forwarding. Although several features could be used to help QoS provisioning, they are not, since managers cannot handle so many device features in large, complex networks. We define “QoS discovery” as the task of searching the network for features that can help or improve QoS provisioning. Normally, QoS discovery is done through SNMP messages sent to devices, or by using any other proprietary method. QoS discovery can also be performed checking equipment documentation, but that is not an operation that could be automated. QoS discovery is helpful in two important moments: in QoS installation and in QoS operation maintenance. In QoS installation the new discovered features can be used to decide among QoS architectures. In QoS operation maintenance, it can report new added equipment with QoS features while the QoS architecture is running. QoS discovery can be effective if discovering mechanisms are installed. Such mechanisms can be simple (polling equipment trying to find MIBs related to QoS architectures) or complex (distributed network monitoring to check traces of critical protocols, such as IGMP [9] and RSVP [3]). 2.4

QoS Monitoring

Managers have to be up-to-date about the difference between the desired QoS and the faced QoS. This difference can never be greater than a defined critical value. If the faced QoS is too different from the desired QoS, user applications would degrade indicating that the contracted services are not running properly. To check the current QoS, managers should collect data in the network through QoS monitoring. This task has to be able to determine two related pieces of information: - End-to-end achieved QoS. The QoS parameters of particular segments are important, but end-to-end QoS is crucial. If end-to-end achieved QoS is not correct, managers must be warned to fix the problem. End-to-end QoS

Integrated Management of QoS-Enabled Networks Using QAME

281

degradation is the sum of the degradation of each segment on the end-to-end path. If just one segment is introducing degradation, that will be noticed in the end-to-end QoS. - Points of degradation. If end-to-end QoS degradation is noticed, QoS monitoring should be able to determine where in a flow path the degradation points are. Today, most QoS monitoring solutions are only able to satisfy the first item. It is simple to check if there is end-to-end degradation, by using RTP/RTCP [10] protocols, for example. However, identifying degradation points is a more complex procedure, and requires more complex processing on the network [11]. 2.5

QoS Analysis

In a proactive management, managers should anticipate future problems and attack them as soon as possible. To achieve proactive QoS management, QoS analysis tasks must be performed. Cataloged historical behavior can show, for example, the number of refused RSVP sessions due to lack of resources. If the number of refused sessions increases too much, it indicates that the manager should update network resources. Analysis of a QoS-dependent monitored client/server operation could show the frequency of QoS degradation, and the frequent degradation points. In this case, the manager should check the critical point to see link problems. One crucial part of QoS analysis is QoS visualization. We consider QoS visualization such an important procedure that it is defined separately from QoS analysis, although it is part of such analysis. 2.6

QoS Visualization

Today’s network management platforms are topology-oriented, i.e., they show information from a network topological perspective. Managers browse network topology and check each desired device. Some facilities can be found, allowing managers, for example, to ask the platform for a map listing every printer. For QoS management tasks, current visualization is poor. Managers often search for each important device in maps, and check to see if such device is QoS-enabled. This is a time-consuming task, and should be replaced with an automated search procedure. QoS visualization is not a task itself. Rather, it is a feature that helps managers to proceed with QoS tasks. Tools should provide visualization based on QoS characteristics. We list here some helpful QoS visualizations. - Colored link utilization. Each link shows, instead of a single black connecting line, a colored set of lines describing link utilization by each flow/aggregate (figure 1, left);

282

L. Zambenedetti Granville et al.

- Selected end-to-end sessions. A topology map should have selected end-toend sessions highlighted through colored lines. Managers could ask to visualize only sessions that match some pre-determined features; - QoS enabled devices. A topology map should highlight QoS-enabled devices. Different colors show devices that implement different solutions. For example, green boxes indicate DiffServ-enabled routers, whereas red boxes indicate RSVP-enabled ones; - Segments with QoS degradation. Segments with QoS degradation could be shown in red or be highlighted (figure 1, right), to indicate degradation. Orange segments could indicate probable degradation coming. -

Av. EF Used EF

Av. AF Used AF

Av. BE Used BE Fig. 1. QoS visualization examples

Several other visualization facilities could be created to help managers identify QoSrelated information. Today, QoS visualization can only be found on separate software that has no integration. The next session shows some current solutions used in QoS visualization and other tasks.

3

QAME

Previous sessions presented QoS-related management tasks and some solutions that help managers perform such tasks. Each solution provides functionalities to attack a particular problem, but that is done independently from other solutions. Thus, there is not any QoS task integration. In addition to the lack of integration, current network management platforms are device-oriented and not QoS-aware, i.e., even if they have QoS support they do not show QoS information properly. A more appropriate environment should allow a network-oriented view to the management, also allowing explicit QoS information. This session presents the current state in the development of a QoS-integrated management environment, called QAME. The environment is QoS-aware in the sense that it takes QoS information explicitly and shows that information more properly. Besides, QAME provides support for managers to proceed with the six QoS tasks previously defined (QoS installation, operation maintenance, discovery, monitoring, analysis and visualization).

Integrated Management of QoS-Enabled Networks Using QAME

3.1

283

QAME Architecture

QAME architecture extends the policy-based solution defined in [12] by introducing some new elements. The architecture is initially divided into active elements and databases. Active elements perform management and QoS provisioning tasks. They also store, retrieve and update information in databases. Active elements are subdivided in an upper element (the User Environment), intermediate elements (Policy Consumer, QoS Monitor and Target Finder) and lower elements (Targets). Figure 2 shows QAME elements and databases, which, on their turn, are presented in the following sub-sessions.

(13) SNMPv2 InformRequest

(11) LDAP

Policy

Status

(10) LDAP

(5) SNMP (Script MIB)

COPS (4)

Intermediate elements

Policy Consumer SNMP (1)

(12) SNMPv2 InformRequest

QoS Monitor (2) HTTP

(15) HTTP

Associations (14) HTTP

(9) SNMP (Script MIB)

User Environment (8) SNMP (Script MIB)

(7) SNMP (Script MIB)

User Environment and databases

(6) SNMP (Script MIB)

Target Finder (3) Telnet

Targets

Fig. 2. QAME architecture Targets Targets are active elements that influence the final QoS observed in the network. Each device can have several Targets that can influence the network parameters. For example, in a router each interface is a Target. Targets are the final elements that effectively implement a QoS architecture. Network manager has indirect access to Targets throughout Policy Consumer, QoS Monitor and Target Finder elements. The interface between these elements and Targets is device-specific, and different protocols should be used to access different Targets. A router from vendor A, for instance, can be accessed via a Telnet client, while another router from vendor B can be accessed via HTTP.

284

L. Zambenedetti Granville et al.

Target Finder In the network, searching each device to identify its Targets is a time-consuming task. Also, new devices just attached to the network must have their Targets cataloged for use. Finally, if QoS discovery is an important task, automatic Target finding will be necessary. Target Finders are special agents that search the network for current and new Targets. Each Target Finder recognizes at least one specific Target, using a specific Target finding algorithm. For example, a DiffServ Target Finder is the one that looks within routers and checks the existence of packet prioritization based on the IP DS field. To do that, the DiffServ Target Finder can open a Telnet session or check for DiffServ MIB implementation. Since each Target can have different capabilities, Target Finders are also responsible for classifying new discovered Targets. Target Finders store any Target information on the Associations database. Policy Consumer Policy Consumer is responsible for installing a policy into Targets. Each Policy Consumer, when ordered to install a policy, retrieves the policy by accessing the Policy database. The new policy is then translated into device-specific instructions to program Target to conform that policy. After policy installation, Policy Consumer is also responsible for checking the success of the policy in the Targets. If a policy could not be installed either due to failure in the Target or to lack of Target capabilities, the Policy Consumer notifies the network manager by sending messages to the User Environment. A Policy Consumer can install policies in several Targets at the same time. On the other hand, each Target can be associated to several Policy Consumers, even though only one can be the current active consumer. QoS Monitor Installed policies might not behave as stated in the policy definition. The QoS resulted from a policy installation can be different from its specification. Critical policies must then have their expected QoS monitored. The element responsible for doing that is the QoS Monitor. The network manager defines which policies must be checked and QoS Monitors are then associated to the Targets that implement those policies. QoS Monitors access policy definitions also in the Policy database and compare the effective behavior on the network with the one defined in the policy. If degradation is observed, QoS Monitor notifies the network manager by sending special messages to the User Environment, too. The greater the number of QoS Monitors used, the more accurate the monitoring process will be. Also, the greater the number of QoS Monitors used, the greater the information analysis overhead will be.

Integrated Management of QoS-Enabled Networks Using QAME

285

User Environment QAME graphic user interface is implemented in the User Environment, which uses Web technology to show management information. User Environment is responsible for running analysis processes that complement the functionality presented in the Policy Consumer, Target Finder and QoS Monitor. For example, User Environment receives special messages from Policy Consumer telling a policy could not be installed, and messages from QoS Monitor when the observed QoS is different from the expected QoS. User Environment also interacts with the three databases in order to define their contents. Users define policies that are stored in the Policy database by using the environment interface. Policies can also be modified or removed from the database. Network topology is shown by accessing the Associations database information. Users check network topology on their Web browsers and order actions to be installed in Targets. Databases The three databases shown in figure 2 are defined to store different classes of information. Every Target, Policy Consumer, QoS Monitor and Target Finder is registered in the Associations database. With appropriate searching of the base, the User Environment can derive the network topology, existing QoS solutions, and resource capabilities. Furthermore, the Associations database stores the associations between Targets and the other elements. For example, a Target named A uses Policy Consumer B for policy translation and installation, QoS Monitor B for policy performance checking and Target Finder C for discovering possible new capabilities in Target A. The policies are stored in the Policy database. Since policies themselves do not define on which Targets they should be installed, policies can be stored separately from Targets. We do that because the database needed for Targets and the database needed for policies have different requirements. Policies once defined have little or no change. On the other hand, Targets can have their capabilities extended, associations updated, and have more changeable data overall. Even more changeable are data used to represent the status of a deployed and/or monitored policy. QoS Monitors and Policy Consumers change data in the Status database every time a deployed policy has its status altered. Thus, Status database binds information stored in the Policy database (the policies) with that stored in the Associations database (the Targets), and introduces new information about this relationship: the status of a policy. 3.2

Elements Location

The previous sub-session described each element of the QAME architecture. This present sub-session explains where in the network infrastructures these elements are located and how many elements of the same type can be used.

286

L. Zambenedetti Granville et al.

The more obvious element location is the Target location. Targets are located within network devices that play any active role in QoS provisioning. Target examples are routers and switch interfaces in their queue disciplines. Marking, policing and shaping processes are also examples of Targets. Targets can be located in hosts, too. RSVP-enabled applications, or DiffServ marking processes in end systems [13] are Targets, since they influence the end-to-end QoS. We leave intermediate elements location for the next paragraphs, since this is a more complicated issue. On the other hand, User Environment location is almost as obvious as Target location was. We use a central point that runs QoS analysis processes and generates HTML pages showing the results. A Web server is also used to allow remote access to the environment. The central point could generate too much traffic on larger networks. Distributed User Environment can be used since databases are detached from the User Environment. Several environments would access the same databases. Databases can be located on the same device that implements User Environment, or on separate devices. Since there are three databases, some can be found together with User Environment, and others separately. Although figure 2 shows only one copy of each database, for security reasons we could have more copies of the same base and use database replication for consistency. Also, more copies of the same database would facilitate the distribution of network traffic generated by QoS Monitors, Policy Consumers and Target Finders when they need to update databases information. A Trickier aspect is the location of Target Finders, QoS Monitors and Policy Consumers. First of all, since they are independent elements they can be located in different places. QoS Monitors are very tightly related to their Targets. Thus, it is expected that QoS Monitors are located within the same devices that contain the monitored Targets. However, depending on the installation of the QoS Monitors, they can also be located close to devices, but not inside. For example, a monitor created to check the bandwidth traffic of a router interface could access the MIB-II interface group and realize that an interface is facing overflow, even though the monitor is not located within the router. Policy Consumers are often located outside devices, but modern equipment is expected to have built-in policy consumer implementations. Even more, Policy Consumers can be located together with the User Environment, thus improving User Environment and Policy Consumer communication. Finally, Target Finders are often located together with User Environment, acting as special plug-ins that search the network for QoS-enabled devices. Target Finders can also be located in network segments other than the User Environment segment. They would act as segment monitors, looking for QoS traffic generated by QoS-enabled devices. The less suitable location for a Target Finder is within devices, since devices and their Targets are the objects of the finding process. One exception is when devices are able to announce themselves and their capabilities to the network, registering on the databases. Up to now, authors are unaware about devices with this feature.

Integrated Management of QoS-Enabled Networks Using QAME

287

Table 1. QAME elements location. Rows list QAME elements and colums list possible locations. Cells marked with an "x" denote that the QAME element in the row can be present in the equipment of the colum. "Devices" are network equipment (routers, switches, bridges, etc.). "Proxies" are network equipment used to host some active elements that act on different equipment (e.g., a QoS Monitor located within a host used to monitor a router). "Hosts" are listed to explicitly define elements located and acting in a host. Finally, "management stations" are used to denote the hosts where QAME User Environment and databases are placed.

Devices

Proxies

Hosts

Targets

x

--

x

QoS Monitors Policy Consumers Target Finders User Environment Databases

x x ----

x x x ---

x x ----

Management stations Only if target plays active role in QoS provisioning x x x x x

One important issue about location is the management interface between the User Environment and Target Finder, QoS Monitor and Policy Consumer. This interface is depicted in figure 2 by the gray rectangles connecting User Environment and intermediate elements. These interfaces can be found together with the elements if the elements implement such interfaces. Otherwise, the interfaces are located in the User Environment and translate requests into element-specific commands. This separation between element implementation and interface is important because modern devices could implement elements with interfaces different from those used by QAME. In this case an interface translation is needed to allow the use of built-in device elements. Table 1 summarizes the possible location of QAME elements. 3.3

Protocols

This sub-session describes the protocols used to provide communication between QAME elements. In the protocol definition phase of the project, we decided to use standard and open protocols to implement such communication. Even though some standard protocols might not be the best choice for some critical tasks, we believe that this choice makes our architecture open, making future implementation of new modules easier. Targets Protocols The protocols used to communicate with Targets are actually defined by the devices that contain the Targets. These protocols are then dependent on the device’s provider, which could choose to use standard protocols or implement its own proprietary protocol.

288

L. Zambenedetti Granville et al.

The most common Targets protocols available are Telnet and SNMP, but modern devices also use HTTP for configuration management (figure 2, labels 1, 2 and 3). Fortunately, proprietary protocols are more rare. Despite the diversity of possibilities, Targets protocols are not a critical issue since intermediate elements are responsible for protocol translations. Thus, when two different routers, using different protocols, should be programmed to prioritize a defined flow, that programming task “sees” the different routers as equal because of the protocol translation executed in the Policy Consumer. This translation also occurs in the QoS Monitor and Target Finder elements (figure 2, labels 1 and 4, 2 and 5, 3 and 6). QoS Monitors, Policy Consumers and Target Finders Protocols Protocols used to communicate with intermediate elements can be divided into two groups: those implemented by the elements, and those used as interface with elements (gray rectangles in figure 2). Protocols implemented by the elements are elementdependent and defined by the element developer. For example, a vendor implementing a Policy Consumer within its new router could use COPS [14] to transfer policies. Another vendor could choose Script MIB [15] definitions to have access to the policies (figure 2, labels 4, 5 and 6). On the other hand, protocols used in the access interface are always the same. This is a requirement to allow access to the same interface in the User Environment. Thus, interface actually implements only protocol translation, from User Environment interface access into the intermediate elements-specific interface (figure 2, labels 4 and 7, 5 and 8, 6 and 9). The current QAME implementation uses Script MIB to communicate with intermediate elements interface. Database Protocols The protocols used to access database information are different because the nature of each base is different. Policy database is reached using an LDAP [16] protocol (figure 2, labels 10 and 11). Since policies are information that has few updates but can be accessed several times, a write-once read-several times protocol like LDAP is more suitable. Status and association information are more dynamic, and LDAP protocol should be avoided. The current implementation uses SNMPv2 InformRequest message to update status information in the Status database (figure 2, label 12). InformRequest messages can be faced as an SNMPv1 trap message with confirmation. Thus, QoS Monitor perceiving QoS degradation can update the status of a monitored flow or aggregate trapping the Status database, and still have confirmation of the update operation due to the reply of the InformRequest message. Policy Consumers can also notify the Status database when a policy deployment fails. The InformRequest message can be forwarded to the User Environment when critical monitoring tasks are performed (figure 2, label 13). Finally, User Environment and Target Finders reach Associations database through HTTP and queries to a PHP4 engine [17] (figure 2, labels 14 and 15).

Integrated Management of QoS-Enabled Networks Using QAME

4

289

Conclusions and Future Works

Providing QoS services in networks is currently very important because timedependent application cannot be deployed using best-effort based services. QoS architectures must be installed, but should also be properly managed to be effective. Traditional network management cannot be applied to QoS management because the amount of available information is much larger and complex. Current efforts try to find a way to allow complexity abstraction by using policybased management. But policies are not sufficient to allow total QoS management. Other QoS management-related tasks are performed by network managers, and support should be available for those tasks. This paper has defined six main QoS management related tasks: QoS installation, operation maintenance, discovery, monitoring, analysis and visualization. Policybased management only addresses QoS operation maintenance. Other tasks have no advantage of policy-based management. For these tasks we have presented current solutions that help managers install them. Unfortunately, there is no integration between solutions, and managers often have to deal with too many tools, increasing the management complexity. To make management easier we have built a QoS management environment called QAME where the six important QoS tasks can be performed in an integrated fashion. We have described the QAME architecture, its elements, and where these elements can be located in the network (e.g., within routers, switches, hosts, or integrated in the management station). QAME elements exchange information to allow integration. This information exchange is done by communication protocols. We have shown that the QAME environment uses LDAP, SNMPv2, Script MIB and proprietary protocols to implement communications. Protocol translation is a required feature to allow better interaction between user environment (where management information is presented) and lower-level elements (where management information is gathered and processed). The protocol translation is possible because QAME architecture detaches lower-level elements implementation from their interface. The element implementation can be located, for example, in a router, while the element interface can be located in the management station. Future works may address security, database replication and distributed management issues. Since SNMP messages are not encrypted, the use of SNMPv3 is a natural choice. Database replication deserves a more accurate research because single database instances could be inadequate to manage very large networks. Because management traffic will be greater, database access at a single point could prevent better management performance. Also, in larger networks, a central point of management should be avoided, and distributed management with more than one User Environment would be preferable.

290

L. Zambenedetti Granville et al.

References 1. Rosen, E., Viswanathan, A., Callon, R.: Multiprotocol Label Switching Architecture. Internet draft . Work in progress (2000) 2. Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., Weiss, W.: An Architecture for Differentiated Services. Request for Comments 2475 (1998) 3. Braden, R., Zhang, L., Berson, S., Herzog, S., Jamin, S.: Resource ReSerVation Protocol (RSVP) - Version 1 Functional Specification. Request for Comments 2205 (1997) 4. Shenker, S., Wroclawski, J.: General Characterization Parameters for Integrated Service Network Elements. Request for Comments 2215 (1997) 5. Nichols, K., Jacobson, V., Zhang, L.: A Two-bit Differentiated Services Architecture for the Internet. Request for Comments 2638 (1999) 6. Case, J., Fedor, M., Schoffstall, M., Davin, J.: A Simple Network Management Protocol (SNMP). STD 15, Request for Comments 1157 (1992) 7. McBride. D.: The SLA Cookbook: A Recipe for Understanding System and Network Resource Demands. Hewlett-Packard Company. Available via URL http://www.hp.com/openview/rpm (1996) 8. Yavatkar, R., Pendarakis, D., Guerin, R.: A Framework for Policy-Based Admission Control. Request for Comments 2753 (2000) 9. Fenner, W.: Internet Group Management Protocol, Version 2. Request for Comments 2236 (1997) 10.Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications. Request for Comment 1889 (1996) 11.Jiang, Y., Tham, C.K., Ko, C.C.: Providing Quality of Service Monitoring: Challenges and Approaches. NOMS 2000 - IEEE/IFIP Network Operations and Management Seminar (2000) 12.Mahon, H., Bernet, Y., Herzog, S.: Requirements for a Policy Management System. Internet draft . Work in progress (2000) 13.Granville, L., Uzun, R., Tarouco, L., Almeida, J.: Managing Differentiated Services QoS in End Systems using SNMP. IPOM 2000 - IEEE Workshop on IP-oriented Operations & Management (2000) 14.Chan, K., Durham, D., Gai, S., Herzog, S., McCloghrie, K., Reichmeyer, F., Seligson, J., Smith, A., Yavatkar, R.: COPS Usage for Policy Provisioning. Internet Draft . Work in progress (2000) 15.Quittek, J., Kappler, C.: Remote Service Deployment on Programmable Switches with the IETF SNMP Script MIB. DSOM 2000 – IFIP/IEEE International Workshop on Distributed Systems: Operations and Management. Springer Werlag (1999) 16.Arlein, R., Freire, J., Gehani, N., Lieuwen, D., Ordille, J.: Making LDAP active with the LTAP gateway: Case study in providing telecom integration and enhanced services. In Proc. Workshop on Databases in Telecommunication (1999) 17.Hypertext Preprocessor – PHP4. Available via WWW at URL: http://www.php.net (2001)

On Web Quality of Service: Approaches to Measurement of End-to-End Response Time Mike Tsykin Systems Engineering Research Centre, Fujitsu Australia Limited 1230 Nepean Hwy. Cheltenham Vic. 3192 Australia [email protected]

Abstract. Tools for direct measurement of Quality of Service (QoS) as represented by End-To-End Response Time (ETE RT) are gaining acceptance. However, classifications of such tools were developed before the wide commercial adoption of the Web and are, thus, out of date. In this paper, author presents an update to Tsykin-Langshaw ’98 classification, with the specific emphasis on the measurement of the Web-based activities. Review of the existing tools is included and specific difficulties of operation in the Web-based environment are discussed. Future trends are indicated.

1.

Introduction

Measurement of Service Levels and particularly End-To-End Response Time (ETE RT) is one of the most necessary facilities for Capacity Management practitioners. The subject is much debated, but practical approaches and tools for Open Systems were lacking for a long time. Recently, the situation changed. Therefore, the objectives of this paper are: • To review the history of measurement of ETE RT • To review and classify the measurement methods and tools • To discuss the direct measurement of Service Levels, including problems encountered in the Web environment and their solutions

2.

Historical Perspective

Measuring computer service has been achieved in many different ways over the past 40 or more years. Initially, with single tasking, batch systems, the measure of service was simple - how long did it take to execute a particular program. This metric naturally progressed to the concept of throughput - how many programs or jobs could be executed in a given amount of time. With this progression, and the birth of performance tuning, came the idea of measuring the performance or efficiency of various critical parts of the system such as the CPU, input/output devices, and memory usage. Over a period these performance/efficiency metrics came to be regarded as indicators of how well the system was doing its job, and operating

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 291–301, 2001 © Springer-Verlag Berlin Heidelberg 2001

292

M. Tsykin

systems were instrumented as a matter of course to provide various metrics, ranging from simple measurements to the results of complex analyses. As operating systems improved, and multi-tasking and online systems became the norm, these system metrics became the common indicators of how well the system was servicing the organization. They were there, and it was easier to use what was available than to make alterations to applications to record service level information directly. Slowly, however, sophisticated ways of determining service levels began appearing. Hardware and software suppliers started to “instrument” their products to provide measures of operation of their equipment. Using those, DP / IS departments started to provide guarantees of service to the organizations concomitant with their spending. And so the Service Level Management was born. Towards the end of the so-called ‘mainframe era’, it even became possible to directly measure terminal response time. Thus, measurement of transaction-based ETE RT became possible. In mainframes, a transaction is assumed to be a single protocol block (SDLC protocol is the dominant one in such an environment) or a message as seen by a Transaction Monitor (e.g. CICS). Either one of these closely relates to a meaningful user interaction, therefore the approach works. Attempts to combine such transactions into more meaningful units (Natural Business Units or NBUs) started, but the environment changed radically. Open Systems arrived in force. The roots of these are in scientific and personal computing. This means that various derivations of TTY protocol became dominant. As opposed to SDLC, this is a byte-mode protocol. Therefore, the correlation between a user action and protocol block disappeared. Furthermore, complex Transaction Monitors went out of fashion. The result of this on the measurement of ETE RT was devastating – it simply became too hard. However, the need remained. Indeed, it even increased due to the advent of Outsourcing (both external and internal). In addition, end-user computing was evolving, with its’ emphasis on service. And so, development continued. First tools started appearing on the market in 1997-98. Rapidly, the numbers of available tools increased, but the acceptance remained cautious. This is still the case, although the recent focus on Internet Quality of Service (QoS) may change the trend in the future.

3.

ETE RT – Approaches to Measurement and Tools

3.1

General

It is useful to formally define ETE RT. In the words of Maccabee [2], ETE RT is: ‘The time between the start of users request (indicated by depressing of a key or a button) and the time when the user can use the data supplied in response to the request’. As such, it adequately describes the level of interaction between a user and a computer system he / she uses. Traditionally, the concept is applied to a single interaction between a user and a system - that is, a transaction. It is assumed that a transaction is a self-contained unit; therefore ETE RT thus derived represents the service level. For the purposes of this chapter, let’s accept this concept of a

On Web Quality of Service

293

transaction with one qualification: a transaction may or may not be directly measurable. If it is not, there is no option but to emulate or simulate it. ETE RT may be broken into discrete components. The most common breakdown is into client, network and server components. This may become complicated if a network of servers is involved in servicing one transaction (multi-tier client-server implementations). Further, depending upon a protocol, each of these components may be further broken down (connection time, Therefore, there are several ways in which transaction-based ETE RT may be measured. McBride [3] proposed one such. Snell [5] identified three types of ETE RT measurement tools. In 1998, Tsykin and Langshaw [6] expanded and modified Snell’s classification. At the same time, independently, Scott and Conway published a similar one. This paper modifies and expands Tsykin / Langshaw classification to reflect the current developments. It is presented below. The four fundamental approaches to measurement of ETE RT are presented below. Known tools are summarized in Figure 1. 3.2

Approaches to Measurement

3.2.1 Benchmarking and Emulation • Description: Benchmarking. This approach involves three essential steps: 1. Intercept user transaction (for instance, access to a Web page) and modify as required. Alternatively, an artificial transaction may be scripted 2. Re-issue this transaction / transactions using ‘robots’ from one or more locations. Robots would measure ETE RT and it’s components 3. Collate and analyze results Emulation This is a variation of ‘benchmarking, except that ‘packets’ of data (e.g. issued by ping command) are used instead of intercepted or scripted transactions • Advantages These approaches are intuitive, conceptually simple and acceptable to most people They are ‘active’, in that they work regardless of whether there are actual users on a system being measured – or not. Therefore, they are suitable (and widely used) for measurement of availability, either throughout a period or at a certain time (e.g. before the start of a morning shift) They support quite a sophisticated approach to troubleshooting, including identification of problem segments via triangulation They are available as either services or products • Disadvantages They are ‘intrusive’. This means that they impose explicit additional load on the system. It need not be large, but may not be philosophically acceptable to many managers

294



M. Tsykin

Penetration: Lately, these emerged as the dominant form of ETE RT measurement. Emulation is, understandably the preferred approach in a scientific community. Benchmarking is the mainstay of the WWW QoS measurement

3.2.2 Instrumented Applications • Description In this case, transaction points are inserted into user applications, which are then monitored. The most widely known version is ARM (toolkit available), but other versions exist also particularly in the Web area • Advantages This is the most suitable approach for application tuning. It enables tracing of application (depending upon positioning of transaction points within code). • Disadvantages It requires changes to source code of applications and, therefore commitment by suppliers and customers Roll-out implications impede acceptance by users Commercial benefits to suppliers are (at best) unclear, which impedes development • Penetration : at present, minimal number of applications is instrumented. This is not expected to change rapidly. 3.2.3 ‘Wire Sniffers’ • Description This approach involves interception of network traffic, analysis of the packets and attribution of those to certain transactions. The rest is conventional analysis. Two possibilities exist for traffic interception: ‘Raw’ network traffic is monitored, decoded and analyzed. Communications traffic on a server or a client is used. This approach, strictly speaking, should be categorized as an Instrumented Client (see below). However, it is included here due to the obvious similarities with the other ‘Wire Sniffer’ approach • Advantages This is a technically clever approach, which provides a comprehensive analysis of network performance and some idea of application response time. • Disadvantages Hardware-based probe (either dedicated or a board in ‘promiscuous’ mode) or instrumentation of Operating System is required. In this case, either a ‘shim’ or LSP (Layered Service Provider) maybe used. Architecture is limited in not supporting data on server performance activity Results are particularly dependent upon placement of the probes within the network • Penetration Small as yet.

On Web Quality of Service

295

3.2.4 Instrumented Clients • Description This approach involves interception, decoding and analysis of Operating System events on a client workstation. Given the penetration and messaging architecture, the logical choice of a client platform is Windows. However, the approach is as useful for other ‘intelligent’ (instrumentable) clients. Of particular interest are the Web-based applications • Advantages An architecturally advanced approach, because it allows tracing of all users of OS services, be they applications or systems products Does not require special hardware, nor instrumentation of applications Within the framework of this approach, ETE RT is easily available as one of the monitored metrics The most flexible approach of all Particularly suitable for product development and debugging • • Disadvantages Requires instrumentation of Operating Systems Presents logistical problems in multi-platform, multi-OS environment Presents problems with measurement of Web activity, due to the coding of popular browsers (neither IE nor Navigator use Windows events much). To overcome that, a combination of ‘wire sniffing’ and instrumented client has proved useful • Penetration Small, but growing 3.3

Summary

All the four approaches described above are in use now. The first one – Benchmarking – is the most popular one at this stage. This is likely to continue. The second (Instrumented Applications) and the third (Wire Sniffing) became ‘niche offerings’ and are likely to remain this way. The fourth (Instrumented Client) enjoyed the initial burst of popularity, and then faltered somewhat due to the technical limitations. These are being overcome and the popularity should return in the future.

4.

Direct Measurement of Service Levels

4.1

Objectives

Objective of Service Level Management (SLM) is to manage service provided to user. Therefore, the first and necessary step is to measure such service. As McBride points out in relation to SLM: ‘What cannot be measured cannot be managed’ [3]. However, he then proceeds to discount client-based measurement in favor of application-based one, and suggests that ARM (Instrumented Applications) should be used for measurement. The author disagrees. It stands to reason that measurement of levels of service to a User should be done from the user’s perspective

296

M. Tsykin

- that is, on a user’s workstation and for user’s units of work - that is, a business transaction, NBUs or equivalent. Naturally, it is desirable to trace the transaction across the network, as is ‘skips’ from server to server. However, from the point of view of MEASUREMENT of service levels though, it is not, strictly speaking, mandatory. Product name

Supplier

SLM EnView Quoetient Tivoli ? MeasureWare FSE ARO

Fujitsu Fujitsu Fujitsu IBM Hewlett Packard Hewlett Packard Concord Computer Associates Computer Associates Candle Compuware Network Associates Ganymede Trio Systems

TNG Response Option ETEWatch EcoScope Sniffer Chariot Hypertrack Performance Monitor Netscout Application Flow Management VitalSuite BEST1 Patrol Info Vista Trinity S3 Keynote Proctor PingER @watch ? NetScore Netcool

Bench -mark

Instr. App-n

* * *

*

Instr. Client * * *

*

* *

* * * * * *

Netscout Lucent BMC BMC Info Vista Info Vista Nextpoint Keynote Dirig SLAC AlertSite.com Quicksand Envive Anacara Micromuse

Wire Sniffer *

* * * * * * * * * * * * * *

Fig. 1. Known Products.

On Web Quality of Service

4.2

297

Metrics

Metrics are best grouped by their intended usage. In the case of Service Level Measurement, there are two main applications: • Monitoring and reporting • Troubleshooting 4.2.1 Monitoring and Reporting. Thus far, two metrics have proved the most popular ones in measurement of service levels: ete rt and availability. These are looked at below. • ETE RT - traditional end-to-end response time measure defined above. It may be successfully measured by Benchmarking, Instrumented Applications or Instrumented Clients methods • Availability – the critical metric, defined as time during which an application is available to be used. Therefore, only active methods (i.e. Benchmarking) may be used to measure it. Other methods are passive, that is they rely on actual user activity. This means that if there’s no activity – there’s no measurement. 4.2.2 Troubleshooting. In troubleshooting, composite metrics are not sufficient. In order to be able to find a problem, one must know the details of ete rt. It was mentioned before that ete rt might be split into one or more (depending upon the level of client-server nesting) groups of three functional components: • Server part • Network part • Client part Server and network parts were explored in detail previously and are well enough understood. However, a client component presents challenges. These stem from the fact that it too is a complex, powerful, multi-tasking platform. Therefore, for troubleshooting purposes, we must be able to measure the interrelations between applications on a client platform. Some metrics suitable for this purpose are listed below: • Application Busy-Switch Time (ABST). The time period between an application becoming busy and user switching away from it. This metric describes a ‘ level of patience’ by a user. Consistently low ABST (say, 1 - 2 seconds) may indicate that a user expects a delay and does not wish to wait. • Application Cycle Time (ACT) The time period between successive switches of focus to an application. Low ACT would indicate a consistently and frequently (but not continuously) used application. • Inter-Application Time (IAT) ... the time period from when focus switches away from a specific application until that application receives focus again. • Application Active Time (AAT). The time period from when an application receives focus until focus is switched away from that application. (Note: IAT + AAT = ACT)

298

• •

M. Tsykin

Consecutive Wait Count (CWC). A count of the number of time the wait cursor was active when focus switched from an application, and still active the next time focus switched to the application. Application Switch Table (AST). A table with applications as row and column headings containing counts of the number of time focus switched from one application (row) to another application (column). It is useful in identifying user work profiles. An example is presented below in Figure 2.

Application A Application B

Application A x 9

Application B 23 x

Fig. 2. Example of Application Switch Table Focus switched from application A to application B 23 times. Focus switched from application B to application A 9 times. Author believes that only the Instrumented Client approach is suitable for this task. Please refer to [6] for more details. 4.3

Methods of Data Capture by Instrumented Client

Discussion below will refer to Windows systems. In principle, there is no reason why similar things may not be done on Unix. However, it was not explored so far. 4.3.1 Hooks. Windows gives us a relatively easy ability to intercept various Operating System events and messages. This is done via the so-called hooks – documented and stable Windows interfaces. Detailed discussion on hooks is beyond the scope of this paper. Please refer to [4] for detailed instructions and examples. To illustrate the point, Figure 3 below provides an example of a GUI used to implement the interception of hooks. These are sufficient to calculate the metrics discussed above for Windows GUI applications. 4.3.2 Layered Service Provider. Non-GUI Windows programs (e.g. services) and both Netscape and Internet Explorer Web Browsers either do not use hooks at all, or use them ‘sparingly’. Therefore, if Service Level measurement is required for these programs, network traffic interception and interpretation must be relied upon. LSP (Layered Service Provider) is available for the purpose. This facility allows one to incorporate user code into the protocol stack with minimal danger of damaging the system. Please refer to [4] for detailed instructions and coding examples and to Figure 3 for an example of a GUI.

On Web Quality of Service

299

4.4 Trouble with the Web 4.4.1 Problems. The approach described in Section 4worked well enough for Windows GUI applications. However, Web-based ones proved initially to be troublesome. There are three reasons: • Web Browsers do not use hooks for internal processing. Thus, it proves impossible to identify URLs using hook information; • Web Browsers use caching. Thus, a requested URL may not appear in network traffic • In secure environments, network traffic may be encrypted. Therefore, even if intercepted by an LSP, it may not be of any use

Fig. 3. GUI Example 4.4.2 Current Resolution. Use of Hooks and Caching. These two problems are combined because they have the same solution – interpretation of hook data (user actions) and network traffic together. User actions supply timing, invaluable in the analysis of network traffic. For instance, it allows the cache problem to be overcome by identifying the first REFER clause of a GET statement after a certain user action. The method is not foolproof, but yields definite results. Security. There is no obvious solution, which is how it should be – proper security should block the monitoring of the kind involved in direct measurement of Service

300

M. Tsykin

Levels. Therefore, if the entire traffic is encrypted, instrumented clients and Wire Sniffers simply do not work. In such a case, the only viable method is benchmarking. However, the overheads of Secure Sockets and their effect on response time generally ensure that only the most sensitive parts of each session are encrypted. If that’s the case, all is not lost, because the representative sample may still be acquired for each session. 4.5 Futures Web Browsers MAY be instrumented – but the author is not aware of an approach that would work for both Internet Explorer (IE) and Netscape. In case of IE, HBO (Help Browser Objects) may be utilized. This MAY provide a way to acquire information directly, without recourse to network traffic analysis. HBOs do not exist for Netscape. However, Mozilla Open Source does! This, in principle, allows any instrumentation to be developed. Research on both subjects is in its infancy at the date of writing.

5.

Conclusion

This paper reviewed the history of the development and existing approaches to measurement of Service Levels, as well as the currently available tools. Objectives and the concepts of direct measurement of Service Levels, appropriate metrics and market penetration were also looked at. It is hoped that all this will be of use to the readers.

6.

Acknowledgement

Author is indebted to Chris Langshaw and Colin Makewell (both of the Systems Engineering Research Centre, Fujitsu Australia Limited). Without their unstinting help, this paper would not have been possible.

7.

Disclaimer

All brand names are Registered Trademarks and Requested Trademarks of their respective owners.

On Web Quality of Service

301

References 1 2. 3. 4. 5. 6.

D. Scott, B. Conwey Tools for Measuring Application Availability and Performance Gartner Group; COM-03-8396; 28/4/98 M. Maccabee Cline/Server End-To-End Response Time: Real Life Experience Proceedings of CMG96 D. McBride Toward Successful Deployment of IT Service Management in the Distributed Enterprise Proceedings of CMG95 Microsoft Developer Network (MSDN) http://msdn.microsoft.com/default.asp M. Snell Tools Solve Mysteries of Application Response Time LAN Times, Vol. 14, Issue 5 http://www.wcmh.com/lantimes/97/97mar/703a034b.html M. Tsykin, C. D. Langshaw End-To-End Response Time and beyond: direct measurement of Service Levels Proceedings of CMG98

Path Computation for Traffic Engineering in MPLS Networks Gargi Banerjee and Deepinder Sidhu Maryland Center for Telecommunication Research Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County 1000 Hilltop Circle, Baltimore, MD 21250 Fax:410-455-1220 Tele:410-455-3063/2860 [email protected], [email protected]

Abstract. We consider the problem of computing traffic engineered paths for bandwidth requests, when these requests arrive in the network independent of one another. Reservation of bandwidth along pre-selected paths have become important in networks providing service differentiation and bandwidth guarantees to applications. Service providers are looking at traffic engineering to automate path selection procedures and to maintain network loading at an optimal level. Sophisticated path selection algorithms are being developed which deviate from the “shortest path” philosophy in traditional IP networks. While these algorithms perform well under moderate network loads, their behavior under high load conditions often leads to risks of network instability. In addition, these sophisticated algorithms are often computationally intensive. In this paper we provide an O(nlogn) algorithm that improves network utilization under moderate load and also maintains stability under high load conditions. We show that the algorithm reduces the complexity of a competitive algorithm and achieves better performance. Keywords: traffic engineering, path computation, K-shortest path, MPLS

1

Introduction

The exponential growth of the Internet has led to the increasing importance of network management and control functions. It is evident today that adding more bandwidth to networks is not the solution to all congestion problems. At the same time, more and more providers are showing interest in making revenues from offering differentiation of services in their networks. This requirement has increased the importance of gaining control over networks via automated Traffic engineering (TE). TE reduces congestion, improves network utilization, satisfies diversified requirements and thus leads to an increase of revenue. P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 302–308, 2001 © Springer-Verlag Berlin Heidelberg 2001

Path Computation for Traffic Engineering in MPLS Networks

303

TE is identified as the most important application of MPLS networks [1]. MPLS traffic engineering (MPLS-TE) enables a MPLS backbone to expand upon traffic engineering capabilities by routing flows across the network based on the resources the flow requires and those currently available. Since the essence of traffic engineering is mapping traffic flows onto a physical topology, it implies that at the heart of MPLS-TE resides the problem of path computation. Traditional best-effort IP networks have always favored “shortest-path” algorithms because of their efficiency and stability under all load conditions. However, as networks become more Quality of Service (QoS) aware it becomes necessary to find paths between a source destination pair (s-d) that are different from the shortest path(s) returned by a minimum distance algorithm (Min-Dist1). This is because the shortest path may be highly congested while alternate paths between s-d are running at relatively lower utilization. In addition, since flows now have different QoS requirements, a single path may not be able to satisfy requirements of all flows between s-d. Previous path computation algorithms were mainly hop-by-hop distributed algorithms optimizing static metrics (e.g. link cost/length etc.). Among the new generation of TE algorithms, [6] considers dynamic weight settings for links but assumes knowledge about future requests. MIRA [4] discusses a source-routing scheme (entire path is computed at a centralized point e.g. source), which considers another dynamic constraint (available maximum flow in the network) to identify critical links. Paths returned by the algorithm tries to avoid these critical links. In this paper, we propose a source-routing algorithm that uses static and dynamic link constraints. The algorithm improves upon MIRA by first bounding path lengths so that they do not exceed a threshold T, and then considers max-flow computations to find a minimal blocking path. We also note that the max-flow computations in MIRA are computationally intensive to run for each request in a large network. As an alternative, we propose using feedback from the network to dynamically identify critical links. The outline of the paper is as follows. In section 2 we describe our TE based path computation approach. Section 3 describes some initial results. In section 4, we present our conclusions.

2

Traffic Engineering Path Computation

In this paper we consider QoS requests of the form (A, B, Bw) where A: source node, B: destination node and Bw: minimum bandwidth the application requires. Using online TE path computation algorithm we then compute a path PA-B that satisfies Bw. We assume Bw units of bandwidth are reserved along PA-B by some TE signaling mechanism like CR-LDP or RSVP [2,3] and are available for the application. No assumption is made about future requests.

1

Min-Dist: Dijkstra/Bellman-Ford type shortest-path algorithm

304

G. Banerjee and D. Sidhu

2.1 Maximizing Open Flow among a Set of Bounded Length Paths The MIRA heuristic was proposed to find a path between a pair of nodes that blocks least amount of available flow between all other source-destination (src-dest) nodes. The interested reader is referenced to [4] for details. For convenience, some of the highlights of the algorithm are given below. N (n, m) : Network of n nodes and m links L : Link set : Given set of all src-dest pairs S : Max-flow between pair (a, b) ∈ S θab : Link from node i to j l(i, j) : Critical links2 between pair (a, b) (determined by max-flow Ca,b algorithm) :Unreserved Bandwidth on l(i, j) r(i, j) The following function assigns dynamic link weight w(i, j ): • Assign_Dynamic_Link_Weights(): w(i, j): ∑ (s, d): l(i,j)∈Cs,dαsd

∀ l(i, j)∈ L, where, αsd = 1/θsd

(1)

Algorithm: For each QoS request (p, q, Bw): Compute the set of critical links Ca,b , ∀ (a, b) ∈ S Assign_Dynamic_Link_Weights() Prune off links that have r(i, j) < Bw Select the shortest path based on w(i,j) Output: Path that blocks the least max-flow between all other srcdest pairs 2 Complexity: O(n √m) using Goldberg Tarjan preflow push algorithm. Fig. 1. MIRA None of the static constraints (e.g. path length, path cost) is considered in MIRA. While at low to moderate network load this might be acceptable, longer paths selected at high load conditions, stresses an already overloaded network by occupying more resources. This may cause network instability. In addition, with this class of algorithms, the path lengths can become long enough to make the path practically unusable.

The first algorithm we propose is a variation to MIRA, which we call BoundedMIRA. Let u(i, j) be a static link metric. This new path computation scheme takes into account the dynamically assigned w(i, j) as well as static u(i, j). We use link length as 2

Critical links defined as union of all minimum cut links [4]

Path Computation for Traffic Engineering in MPLS Networks

305

our static metric in all our experiments. The highlight of Bounded-MIRA is that it first finds a candidate set of paths by the K-shortest paths3[5] algorithm (O(m + nlogn + K)) on the static link metric u(i, j). This returns a set of K paths on which MIRA type computations finds the path that blocks the least amount of max-flow among other source-destination pairs. Thus, the path returned is never longer than the K-th shortest path. Algorithm : For each QoS request (p, q, Bw): A = K-shortest path set computed based on static metric u(i, j) Compute the set of critical links Ca,b , ∀ (a, b) ∈ S Assign_Dynamic_Link_Weights() Prune off links that have r(i, j) < Bw From among K paths in A, select shortest path from based on dynamic wt. w(i, j) Output : Path in A that blocks least max-flow among all src-dest pairs. 2 2 Complexity: O(m + nlogn + K) + O(n √m) = O(n √m) Fig. 2. Bounded-MIRA

2.2 Using TE Information to Reduce Algorithm Complexity Max-flow computations open up the possibility of using dynamic constraints in path computation and by using Bounded-MIRA type algorithms we can find length constrained minimum blocking paths. However, the commonly known max-flow 2 algorithms have a complexity of O(n √m) whereas the simplest shortest path algorithms are of O(nlogn) complexity. Max-flow computations are thus expensive especially when they have to be run for millions of requests. We propose using link_load, another dynamic constraint that does not need such expensive computations. Instead, we can rely on existing traffic engineering infrastructure to provide this information. The basic assumption is that most networks run link state Interior Gateway Protocols (IGP) for routing purposes. [7] suggests simple extensions to IGPs by which dynamic TE information like reserved link bandwidth can be periodically fed-back to the source nodes. This information can be used in place of max-flow computations for identification of critical links. We define link loading as: link_load(i,j) = (Reserved Bw on l(i, j) / Total Reservable Bw on l(i, j)) * 100

3

(2)

Network optimization problem where K-shortest paths are ranked between an initial and a terminal node.

306

G. Banerjee and D. Sidhu

A critical link is now defined as a link which has its load running above a threshold percentage U. We use the following function and parameter definitions in our algorithm. • Identify_CN(): CN, : Set of critical links of a network N. l(i, j) ∈ CN, if link_load(i,j) > U.

(3)

• Assign_Dynamic_Link_Weights(): Each link l(i, j) is assigned a dynamic critical weight w(i, j), where: w(i, j ) = 0 if l(i, j) ∉ CN

(4)

w(i, j ) = α(i, j)

if l(i, j)∈ CN , where α(i, j) ∝ link_load(i,j).

• Criticality of a path P is defined as: W(P) = ∑ w(i, j) ∀ l(i, j)∈ P

(5)

(6)

We propose the Least-Critical-K-Shortest (LCKS) path algorithm in which the computation takes into account dynamically assigned link weight w(i, j) as well as a static link metric u(i, j). LCKS and Bounded-MIRA differ in their definition of criticality and hence in their computational complexity. Algorithm: For each QoS request (p, q, Bw): Prune off links that have r(i, j) < Bw A = K-shortest path set computed based on static metric u(i,j) Identify_CN() Assign_Dynamic_Link_Weights() From among K paths in A, select least critical path based on W(P) Output: Least critical path that is no longer than K-th shortest path. Complexity: O(m + nlogn + K) + O(n) + O(K) =O(nlogn)

Fig. 3. Least-Critical-K-Shortest path (LCKS)

3 Performance Studies We present some initial results of comparisons of the path computation algorithms. All experiments have been run on random networks consisting of 10, 15 and 20 nodes

Path Computation for Traffic Engineering in MPLS Networks

307

4000

MIRA

3000

BoundedMIRA

2000

MIRA

40000

LCKS

20000

BoundedMIRA

0 15 00 0

30000

29000

28000

27000

26000

25000

23000

20000

15000

12000

7000

5000

10000

0

0

3000

1000

60000

32 00 0

Min-Dist

30 00 0

5000

27 00 0

6000

80000

25 00 0

7000

100000

23 00 0

8000

120000

20 00 0

9000

1000

Blocked Bandwidth (bw units)

10000

Decrease in total available flow (bw units)

with an average node degrees varying in the range of 4-6. Experiments with higher number of nodes and node degrees are in progress. All links are symmetric and link weights assigned randomly. Link capacities vary from moderate (12000 units of reservable Bw) to high (48000 units of reservable Bw). The ratio of moderate to high capacity links in all networks was fixed at 3:1. For each network, there was a fixed set S of all possible source-destination pairs. Requests were generated by an offline utility and were of the form (src, dest, Bw). The source and destination nodes were picked randomly from S. The bandwidth requirement varied uniformly from 1 to 4 units. The results reported are for a 20-node network with maximum node degree of 10. Fig. 4 shows the bandwidth blocking (Bw request refused) obtained from MIRA, Bounded-MIRA and Min-Dist routing. We note that blocking (high load condition) begins only after about arrival of 20000 requests. Blocking in Min-Dist is relatively more. We note that as load increases, both MIRA and Bounded-MIRA perform equally well.

Total number of requests

Total number of requests

Fig. 4. Bandwidth blocking

Fig. 5. Decrease in total available flow at high load

Fig. 5-7 presents comparisons of MIRA, Bounded-Mira and LCKS. In Fig. 5, we note that as load conditions increase, all three algorithms have comparable performance in terms of minimizing reduction in network flow. Thus, our scheme based on TE feedback information is as efficient as one that uses expensive max-flow computations. The load of a path is measured by the maximum load of its component links. Fig. 6 shows that under high load condition the average loading of LCKS paths is the lowest. Bounded-MIRA returns lower-loaded paths than MIRA. For Fig. 7, we define stretch factor of a path P(x, y) as ∆(x, y) = T(x, y)/ C(x, y), where T(x, y): length of P(x, y), C(x, y): length of shortest-path returned by Min-Dist. As shown, LCKS paths have the least average ∆ even at highest network load conditions. MIRA paths have the highest ∆. The least loaded shorter length LCKS paths returned under high load conditions demonstrates the stability of the algorithm.

G. Banerjee and D. Sidhu 0.62

1.16

0.6

1.14

0.58 0.56

MIRA

0.54

LCKS

0.52 0.5

BoundedMIRA

0.48 0.46

Average Path Stretch Factor (∆)

Average Path Load

308

1.12 1.1 1.08

MIRA

1.06

LCKS

1.04 1.02

BoundedMIRA

1 0.98 0.96

0.44

20000 23000 25000 27000 30000 32000

20000 23000 25000 27000 30000 32000

Total number of requests

Total number of requests

Fig. 6. Increase in avg. path load at high load Fig. 7. Avg. path stretch factor (∆) at high load

4

Conclusion

W conclude that while dynamic link metrics can help us maintain network loading at an optimal level, it is always useful to use static constraints like link length to bound the path characteristics. This avoids using up critical resources during high load conditions. We also show that utilizing TE feedback information rather than expensive max-flow computations can help to reduce algorithmic complexity while giving good performance under high load. From this perspective, LCKS qualifies as an efficient TE path computation algorithm.

References [1] D. Awudche, J. Malcolm, J.Agogbua, M. O’Dell, J. McManus, “Requirements for Traffic Engineering Over MPLS”, Request for Comments:2072, September 1999. [2] Bilel Jamoussi, “Constraint-Based LSP Setup using LDP”, Work in Progress, July 2000. [3] D. Awudche, L. Berger, D. Gan, T. Li, V. Srinivasan, G. Swallow, “RSVP-TE: Extensions to RSVP for LSP Tunnels”, Work in Progress, August 2000. [4] M. Kodialam and T. Lakshman, “Minimum Interference Routing with Applications to MPLS Traffic Engineering,” Proceedings of IEEE INFOCOM’2000, March 2000. [5] D. Eppstein, “Finding the k shortest paths,” SIAM Journal on Computing, 28: 652673, 1998. [6] B. Fortz, M. Thorup, “Internet Traffic Engineering by Optimizing OSPF Weights”, Proceedings of IEEE INFOCOM’2000, March 2000. [7] D. Katz, D. Yeung , “Traffic Engineering Extensions to OSPF”, Work in Progress, Oct. 2000.

Minimum Regret Approach to Network Management under Uncertainty with Application to Connection Admission Control and Routing♣ Vladimir Marbukh National Institute of Standards and Technology 100 Bureau Drive, Stop 8920 Gauthersburg, MD 20899-8920, USA [email protected]

Abstract. This paper proposes a framework for network management intended to balance network performance under normal steady operational conditions with robustness under non-steady, and/or adverse conditions. Working in conjunction with anomaly and/or intrusion detection, the proposed framework allows the network to develop a set of measured responses to possible anomalies and external threats by minimizing the average maximum network losses, i.e., regrets or risks, due to uncertainty. Loss maximization guards against uncertainty within each scenario. Averaging of the maximum losses reflects an available information on the likelihood of different scenarios. The proposed framework includes Bayesian and minimax approaches as particular cases. The paper demonstrates how the proposed framework can alleviate high sensitivity of a cost-based admission and routing scheme to uncertain resource costs and possible presence of excessive and/or adversarial traffic. Specific examples include competitive and minimum interference admission and routing schemes.

1 Introduction Different approaches to providing Quality of Service ( QoS ) guarantees by a system of shared resources include using Traffic Controlling Devices (TCD) for traffic shaping and policing, Fair traffic Scheduling Mechanisms (TSM), and Measurement Based Control (MBC). TCD and TSM allow the network to provide QoS guarantees to a source complying with its service agreement by making admission control decisions based on the worst case scenario. However, due to a wide range of traffic patterns generated by current and especially future applications, this approach runs a risk of significant over provisioning of the network resources under normal operating conditions. This risk can be mitigated by MBC, which extracts control information from on-line measurements [1]. This real-time control information can be used by the resources to control usage and/or by users to modify their behavior according to ♣

This work was supported in part by DARPA under NMS program.

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 309–318, 2001 © Springer-Verlag Berlin Heidelberg 2001

310

V. Marbukh

the smart market concept [2]-[7]. Reliable extraction of the control information from the measurements and optimal behavior of smart market are achievable in equilibrium. However, even in equilibrium MBC faces a problem of making decisions under uncertainty due to the statistical nature of measurements and state aggregation needed to reduce amount of signaling information. The uncertainty becomes a critical problem for a network operating under non-steady and/or adversarial conditions. These conditions may be a result of natural events, i.e., fiber cuts, flash crowds, and/or adversary attack, i.e., denial of service attacks [8]. Since anomaly and intrusion detection procedures are based on statistical inferences, such as hypotheses testing, clustering, discriminant analysis, etc., the result of the detection is typically a set of possible scenarios and their likelihood. Uncertainty within a scenario may be a result of interval rather than point estimates for the state of environment specified by the scenario. For example, for flash crowds and distributed denial of service attacks a scenario represents a subset of flows - an aggregate, responsible for congestion [8]. Uncertainty results from difficulty to identify the aggregates and inability to distinguish between legitimate and excessive traffic within each aggregate. Currently commercial networks including the Internet may carry mission-critical applications with wide range of bandwidth and QoS requirements. Possibility of anomalies caused by sudden increase in offered traffic, fiber cut and/or an adversary attack necessitates developing network management schemes that balance cost efficiency under normal operating conditions with robustness under non-steady and/or adversarial conditions. The right balance between cost efficiency and performance can be achieved by adaptive sharing of the network management responsibilities between MBM, TCD and TSM. The critical role in this collaboration belongs to MBM which determines the optimal "weight" of each scheme by adjusting parameters of the TCD and/or TSM algorithms. Section 2 of this paper proposes a framework for network management under uncertainty. Working in conjunction with anomaly and/or intrusion detection, the proposed framework allows the network to develop a set of measured responses to possible anomalies and external threats by minimizing the average maximum network losses, i.e., regrets or risks, due to uncertainty. Loss maximization guards against uncertainty within each scenario. Averaging of the maximum losses reflects an available information on the likelihood of different scenarios. The proposed framework includes Bayesian and minimax approaches as particular cases. Section 3 demonstrates how the proposed framework can alleviate high sensitivity of cost-based admission and routing strategies to the uncertain resource costs and possible presence of excessive and/or adversarial traffic. Section 4 considers specific examples of competitive [9] and minimum interference admission and routing schemes [10].

2 Risk Assessment and Management Throughout the paper we assume that the network utility

W (u θ ) , typically the

revenue generated by the network, is a known function of the network control action

Minimum Regret Approach to Network Management under Uncertainty

311

u and environment θ . Vector u may describe pricing, resource allocation, admission control, routing, scheduling etc., and vector θ may characterize topology, resource capacities, traffic sources, etc. We consider a problem of selecting the network control action u under incomplete information on the state of environment θ . This section discusses approaches to assessment and minimization of the risks due to uncertainty. 2.1 Risk Assessment

θ is known, the optimal control action u = u * (θ ) maximizes the network utility W (u θ ) :

If the state of environment

u * (θ ) = arg max W (u θ ) .

(1)

u∈U

Formula (1) determines the best network response to given θ . In presence of other players besides the network, e.g., users, each player determines his best response to the other player strategies and the state of environment θ by maximizing his utility function. Harsanyi transformation of sequential games with incomplete information [11] assumes that the state of environment θ is selected by "Nature" at the beginning

p 0 (θ ) known to all players. Players may have private information regarding selected vector θ and they update their information on the selected vector θ according to Bayesian rules as game proof the game according to some probability distribution

gresses. According to this approach, the best network response is

u * = arg max ∑ W (u ,θ ) p (θ ) u∈U

where

(2)

θ

p(θ ) is the updated distribution p 0 (θ ) . According to the theory of non-

cooperative games, once the best responses by players are determined, reasonable players should select their equilibrium strategies. Note that a number of equilibrium concepts exist, including the most widely used Nash equilibrium. In this paper we are interested in a case when the "Nature", or as we prefer to call it "environment" may have malicious intend directed towards some players, i.e., the network and some users. Due to space constraints, in this paper we only consider a case when this malicious intend may be directed towards the network. Following Savage [12] we characterize the network loss in performance resulted from nonoptimal selection of the control action u due to uncertain environment θ by the following regret or loss function:

L(u θ ) = max W (u ' θ ) − W (u θ ) . u '∈U

(3)

312

V. Marbukh

Local maximums

θ i* = θ i* (u ) of the loss function (3) over θ represent different

risk factors for the network due to uncertain environment (for example see [13]). We propose to model uncertain environment as a player with utility function (3) and certain restrictions on the set of strategies θ ∈ Θ . This assumption leads to a framework for network management under uncertainty, which, in effect, is a systematic approach to balancing different risk factors. Bayesian and minimax approaches are particular cases of this framework. Note that there is a certain degree of freedom in selecting loss function

L(u θ ) . This selection reflects the desired balance between different risk factors. Using loss function (3) in networking context has been proposed in [13]. Competitive approach to admission control and routing [9] guards the network against the worst case scenario with respect to the state of environment θ by containing the losses

L(u θ ) =

1 max W (u ' θ ) − 1 W (u θ ) u '∈U

(4)

where vector of control action u represents admission control and routing, and vector θ represents completely unknown sequence of future request arrivals. The competitive approach assumes that the holding times are known upon request arrival, at least in probabilistic sense. Another basic assumption is that exact information on the instantaneous link utilization is available. 2.2 Risk Management Network operating under non-steady and/or adversarial conditions cannot rely on extensive historical data to estimate the state of environment θ . However, some aggregated information on θ is often available. We assume that this information can be quantified in terms of probabilities

pi = Pr ob(θ ∈ Θ i ) ,

partition of the region of all possible vectors regions

Θi :

∪Θ i

i



i

p i = 1 for some

Θ = {θ } into set of mutually exclusive

= Θ , Θ i ∩ Θ j = ∅ . Given scenario { pi , Θ i } , the optimal

network response is

u * = arg min L (u )

(5)

u∈U

where the performance loss (regret or risk) due to uncertainty is

L (u ) = ∑ pi max L(u θ ) . i

θ ∈Θ i

(6)

Minimum Regret Approach to Network Management under Uncertainty

313

Procedure (5)-(6) can be interpreted as a game between the network and environment with constraints on the set of environment strategies. In an extreme case when each subset Θ i is a singleton, i.e., consists of a single point θ , procedure (5)-(6) reduces to the Bayesian procedure (2). In another extreme case when Θ is partitioned into itself and the empty set ∅ , procedure (5)-(6) can be interpreted as a zero sum game between the network and environment. Since anomaly and/or intrusion detection typically results in a set of possible scenarios s = {1,.., S } rather than one scenario, the network faces a task of balancing risks associated with different scenarios. This task can be formulated a multi criteria optimization problem

min (R1 (u ),.., RS (u ) )

(7)

u∈U

where risk associated with scenario

s is Rs (u ) = Ls (u ) − min Ls (u ' ) , and the u '∈U

s is Ls (u ) . Pareto frontier yields a reasonable set of the network control actions u ∈ U in this situation. Any additional information loss in performance for scenario

can be used to reduce the set of Pareto solutions. For example, if anomaly and/or intrusion detection can identify (subjective) probabilities π s of different scenarios

s,

∑π s

s

= 1 , then the network may minimize the average (Bayesian) risk min ∑s π s Rs (u ) .

(8)

u∈U

In a case of unknown

π s and/or adversarial environment the network may prefer to

minimize the maximum risk

min max Rs (u ) .

(9)

u∈U s =1,..,S

Working in conjunction with anomaly and/or intrusion detection the network should perform two tasks. The long time scale task is maintaining and updating a library of possible scenarios s and subroutines for calculating the corresponding risks Rs (u ) . The short time scale task is risk minimization (7).

3 Connection Admission Control and Routing under Uncertainty Admission of a request, on the one hand, brings revenue to the network, but, on the other hand, ties up the network resources until the service is completed, and thus may cause future revenue losses due to insufficient resources for servicing future requests. The implied cost of a resource represents this potential revenue loss, and the surplus value is the difference between the revenue brought by the admitted request and the implied cost of the occupied resources. An incoming request should be accepted if

314

V. Marbukh

the surplus value is positive, and should be rejected otherwise. This section demonstrates how proposed approach to risk assessment and management can be used to balance the performance and robustness of a cost based connection admission control and routing scheme under uncertainty. 3.1 Risk Associated with Connection Admission and Routing Consider an arriving request for bandwidth b on a route

r ∈ {r1 ,.., rk } , where the

{r1 ,.., rk } is determined by the origin-destination of the request, availability of the bandwidth, maximum allowed number of hops, QoS requirements, etc. Let the implied cost of tying up bandwidth b along route r be c r where we dropped b from notations. Given the set of feasible routes and route costs, the optimal route r* and admission condition for an arriving request willing to pay rate w are as follows: set of feasible routes

c* ≡ c r* = min c r ≤ w .

(10)

r∈{ r1 ,..,rk }

The implied costs c r are determined by future events such as future request arrivals, holding times, availability of resources, topology, etc. Inability of the network to predict these future events, especially in non-steady and/or adversarial environment, is a source of uncertainty in the implied costs c r . Uncertainty in w may be caused by presence of excessive and/or malicious traffic such as in flash crowds or denial of service attack [8]. Utility of the admission and routing decisions can be characterized by the surplus value

w − c r W (r w, c) =   0

if r ≠ ∅ if r = ∅

(11)

where the request is accepted on route r if r ≠ ∅ , and is rejected if r = ∅ . For utility function (11) the loss function (3) takes the following form:

max{0, w − c* } + c r − w if r ≠ ∅ . L(r w, c) =  max{0, w − c* } if r = ∅ 

(12)

3.2 Approximation of Separable Route Costs Computational feasibility to minimize losses (12) over range Θ of possible vectors of implied costs (c r : r = we consider a case of separable route costs:

r critically depends on the r1 ,.., rk ) . In this subsection

Minimum Regret Approach to Network Management under Uncertainty

Θ=

∩ [c , c ] . r

315

(13)

r

r = r1 ,..,rk

Note that (13) is a "first order" approximation to more realistic scenarios since implied costs c r of different routes strongly correlate with each other due to the global nature of implied costs and route overlapping. In a symmetric case: c r ∈ [c , c ] , ∀r = r1 ,.., rk , the network has two pure strategies: reject the request, and accept the request on a randomly selected route r = r1 ,.., rk . The adversarial environment has two pure strategies c r = c and

c r ∈ c for r = r1 ,.., rk . The corresponding payoff matrix (12) is: reject : accept : c : max{0, w − c} max{0, w − c} + c − w . c : max{0, w − c} max{0, w − c} + c − w

(14)

Game (14) has different solutions in the following three cases. In cases w ≤ c and w ≥ c game (14) has the saddle point and the network has pure optimal strategy to reject and, respectively, accept the request. In a case c < w < c game (14) does not have saddle point and optimal strategy for the network is mixed: reject the request 1 − α , and accept with probability α , where with probability

α = ( w − c ) (c − c ) .

In a general case of separable route costs (13) if

w ≤ c* ≡ min r c r or

w ≥ c* ≡ min r c r , then the corresponding game has the saddle point and the network has pure optimal strategy to reject and, respectively, accept the request on a route

r opt : c r opt ≡ min r c r . In a case c* < w < c* the corresponding game does

not have the saddle point and the optimal strategy is closely approximated by the following mixed strategy: reject the request with probability 1 − α , and accept with probability α on route optimization problem:

r opt , where α and r opt are determined by the following  w − cr  α = max  . r = r1 ,..,rk c − c  r r 

(15)

316

V. Marbukh

4 Examples This section presents examples, including an aggregated version of the competitive scheme under uncertain holding times, and an aggregated version of the Minimum Interference Routing Algorithm (MIRA). 4.1 Aggregated Competitive Scheme under Uncertain Holding Times A competitive admission and routing scheme [9] strives to contain loss (4) under the worst case scenario sequence of future request arrivals θ . It was shown [9] that these maximum losses can be bounded by O (logντ ) assuming that the holding time τ becomes known upon arrival of the request, and where ν is some constant. This bound can be achieved with the cost-based admission control and routing strategy with additive route costs, i.e., the cost c r of a route r is a sum of the costs c j of the links

j comprising the route r : c r = ∑ j∈r c j . The cost of a link j is a function

x and holding time τ : c j = c j (τ , x) . In a case of throughput maximization [9] the link j cost is of the instantaneous load carried by the link

c j (τ , x) = [(2 Fhτ + 1)

x Bj

− 1]B j

(16)

F is some constant, the maximum number of hops allowed in a route is h , and link j bandwidth is B j . where

The proposed in this paper framework can be used to mitigate assumption of known, at least probabilistic sense [9], holding times, and address the need to aggregate the real-time information on instantaneous link utilization x . As an illustration consider a case of uncertain holding time τ ∈ [τ , τ ] , and two aggregates: link j is said to be in the aggregate state

y j = 0 if the link instantaneous utilization

x j ∈ [0, B1 j ] and y j = 1 if x j ∈ [ B1 j , B j ] where B1 j ∈ [0, B j ] is some threshold. The uncertainties in route

r cost c r :

∑c j∈r

where

τ and x j cause the following uncertainty in the

j

( y j ) ≡ cr ≤ cr ≤ cr ≡ ∑ c j ( y j )

(17)

j∈r

c j (0) = 0 , c j (1) = c j (τ , B1 j ) , c j (0) = c j (τ , B1 j ) , c j (1) = 2 Fhτ B j .

Under approximation of separable route costs (13), subsection 3.2 results define the aggregated version of the competitive scheme under uncertain holding times.

Minimum Regret Approach to Network Management under Uncertainty

317

4.2 Aggregated Minimum Interference Routing Algorithm Minimum Interference Routing Algorithm (MIRA) [10] does not assume any knowledge of future request arrivals or holding times, but takes advantage of the known network topology by selecting routes that do not "interfere too much" with a route that may be critical to satisfy future demands. The problem was motivated by the need of service providers to set up bandwidth guaranteed path in their backbone or networks. An important context in which these problems arise is that of dynamic Label Switching Path (LPS) set up in Multi-Protocol Label Switched (MPLS) networks. In MPLS packets are encapsulated at ingress points, with labels that are then used to forward the packets along LPSs. Service providers can use virtual circuit switched, bandwidth guaranteed LPSs as component of an IP Virtual Private Network (VPN) service with the bandwidth guarantees used to satisfy customer service-level agreements (SLAs). MIRA is a heuristic, on-line, state-dependent, cost-based routing algorithm with additive route costs:

c r = ∑ j∈r c j . The link j cost c j is a function of the

vector of residual link capacities

z = ( z i ) in all links i :

c j ( z) =

∑w

nm

( j) δ nm ( z)

(18)

( n,m )

where

(n, m) are all possible ingress-egress pairs, wnm is the revenue generated by

providing an unit of bandwidth to ingress-egress pair

( j) (n, m) , and δ nm ( z ) = 1 if

( j) j is critical for ingress-egress pair (n, m) , and δ nm ( z ) = 0 otherwise. Link j is critical for ingress-egress pair (n, m) if the maximum flow for pair (n, m) decreases whenever the residual capacity of link j decreases, and is not critical other-

link

wise. Paper [10] discusses effective algorithms for calculating sets of critical links, i.e., indicators

( j) δ nm ( z ) , and reports simulation results.

The proposed in this paper framework can be used to mitigate the following problems of MIRA. The first problem is inability to utilize an available incomplete information on the expected loads. The second problem is high sensitivity to the current set of critical links, which is likely to change in the future due to fluctuations in the vector z . The third problem, related to the second one, is need to aggregate the residual capacities. Due to space constraints we briefly address the second and third problems. Assuming that available information on residual link i capacity z i is characterized by aggregates

∑w

( n ,m )

nm

z i ∈ [ z i , z i ] , the range for the link j cost c j is

( j) δ nm (., z j −1 , z j , z j +1 ,.) ≤ c j ≤

∑w

( n,m )

nm

( j) δ nm (., z j −1 , z j , z j +1 ,.) .

(19)

318

V. Marbukh

Under approximation of separable route costs (13), subsection 3.2 results define the aggregated version of MIRA.

References 1. 2. 3. 4. 5. 6. 7. 8.

9. 10.

11. 12. 13.

Courcoubetis, C., Kelly, F.P., and Weber, R., Measurement-based usage charges in communication networks. http://www.statslab.cam.ac.uk/Reports/1997/ Bonomi, F., Mitra, D, and Seery, J., Adaptive algorithms for feedback-based flow control in high-speed wide-area networks. IEEE JSAC, 13 (1995) 1267-1283 Low, S.H., and Varaiya, P.P., A new approach to service provisioning in ATM networks. IEEE Trans. On Networking, 1 (1993) 547-553 MacKie-Mason, J.K. and Varian, H.R., Pricing congestible network resources. IEEE JSAC, 13 (1995) 1141-1149 Shenker, S., Fundamental design issues for the future Internet. IEEE JSAC, 13 (1995) 1176-1188 Gibbens, R. and Kelly, F.P., Resource pricing and evolution of congestion control. http://www.statslab.cam.ac.uk/~frank/PAPERS/evol.html Kelly, F.P., Mauloo, A., and Tan, D., Rate control in communication networks: shadow prices, proportional fairness and stability. J. of the Oper. Res. Soc., 49 (1998) 237-252 Mahajan, R., Bellovin, S.M., Floyd, S., Ioannidis, J., Paxson, V., and Shenker, S., Controlling high bandwidth aggregates in the network. http://www.research.att.com/~smb/papers/ Plotkin, S., Competitive routing of virtual circuits in ATM networks. IEEE JSAC, 13 (1995) 1128-1136 Kar, K., Kodialam, M., and Lakshman, T.V., Minimum interference routing of bandwidth guaranteed tunnels with MPLS traffic engineering applications. IEEE JSAC, 18 (2000) 2566-2579 Harsanyi, J.C., Papers in Game Theory. Reidel Publishing Company (1982) Blackwell, D. and Girschick, M., Theory of Games and Statistical Decisions. Wiley, New York (1954) Marbukh, V., Network management under incomplete information on the operational environment. Intern. Symp. on Inform. Theory and its Appl. (ISITA2000) 637-640

MPLS Restoration Scheme Using Least-Cost Based Dynamic Backup Path Gaeil Ahn1 and Woojik Chun2 1Network

Security Department, Electronics and Telecommunications Research Institute (ETRI), 161 Kajong-dong, Yusong-gu,Taejon, 305-350, Korea [email protected] 2Department of Computer Engineering, Chungnam National University 220, Goong-Dong, Yusong-Gu,Taejon, 305-764, Korea [email protected] http://flower.ce.cnu.ac.kr/~chun

Abstract. The path restoration in MPLS is the technique to reroute traffic around a failure in a LSP. The existing path restoration schemes have some difficulty in solving problem such as resource utilization and protection of backup path. This paper proposes a dynamic path restoration scheme using the least-cost based backup path, which may increase resource utilization and protect backup path without requiring longer restoration times. In the proposed scheme, each node on working path has candidate nodes that may become an egress node of backup path. The node that detects a failure finds a node out of the candidate nodes that is used as splicing node of backup path at the lease cost. And then it establishes new backup path up to the node in order to reroute traffic on working path to the backup path. Through simulation, the performance of the proposed scheme is measured and compared with the existing scheme in terms of packet loss, re-ordering of packets, concurrent faults, and resource utilization.

1 Introduction The explosive growth and the advent of sophisticated services of Internet have reduced the actual carried traffic and service quality. So IETF(Internet Engineering Task Force) is developing Multi-Protocol Label Switching(MPLS)[5][12], which combines flexibility of IP routing and efficiency of link-level switching. MPLS router, called Label Switching Router(LSR), enables to forward IP packet directly to a next hop by using label inserted in the packet as index into table which specifies the next hop. Label Distribution Protocol(LDP)[10] is defined to distribute labels and to establish Label Switched Path(LSP). MPLS also provide capability that can establish a Constraint-based Routed LSP(CR-LSP), which is Explicit-Routed Label Switched Path(ER-LSP) based on QoS. For it, CR-LDP(Constraint-based Routing LDP)[1] and RSVP(ReSerVation Protocol)-TE[3] was proposed. The ability to protect traffic around a failure or congestion in a LSP can be important in mission critical MPLS networks. The path restoration[13] is to reroute traffic around a link/node failure or congestion in a LSP; that is, packets will be followed along the backup path in case of working path failure. P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 319–328, 2001 © Springer-Verlag Berlin Heidelberg 2001

320

G. Ahn and W. Chun

Such a backup path can be established after a working path failure is detected or, alternatively, it can be established beforehand in order to reduce the path switchover time. The former is called a dynamic protection and the latter is called pre-negotiated protection. According to how the repairs are affected upon the occurrence of a failure on the working path, two possibilities exist: global repair and local repair. In global repair, protection is always activated on end-to-end basis, irrespective of where a failure occurs. But, in local repair, protection is activated by each LSR that detects a failure. Even if dynamic protection can increase resource utilization, most of the existing schemes have used pre-negotiated protection[2][4][8]. This is because dynamic protection may require longer restoration times and even fail in setup of backup path. However, pre-negotiated configuration also has some difficulty in solving problem such as resource utilization and protection of backup path. This paper proposes a dynamic path restoration scheme using the least-cost based backup path, which may increase resource utilization and protect backup path without requiring longer restoration times. In our scheme, there are two main ideas in establishing backup path. One is candidate nodes that may become an egress node of backup path. The other is Least-Cost Backup-Path algorithm used to find a node out of the candidate nodes that is used as splicing node of backup path at the lease cost. The rest of this paper is organized as follows. Section 2 overviews and analyzes the existing path restoration schemes. Section 3 explains our scheme. In section 4, the performance of the proposed scheme is measured and compared with the existing scheme in terms of packet loss, re-ordering of packets, concurrent faults, and resource utilization through simulation. Finally conclusion is given in Section 5.

2 Related Research In this paper, two prevailing schemes are introduced; those are Haskin's scheme[4] and Makam's[2]. Haskin's scheme uses pre-negotiated protection and local repair. Makam's scheme uses pre-negotiated protection and global repair. Fig. 1 shows Haskin's scheme and Makam's. In Fig. 1, the straight line between LSR1 and LSR9 is the working path. In Haskin scheme, a backup path is established as follows: 1. The initial segment of the backup path is established between PML(Protection Merging LSR) and PIL(Protection Ingress LSR) in the reverse direction of the working path. In Fig. 1, the dashed line between LSR9 and LSR1 illustrates such a segment of the backup path. 2. The second and final segment of the backup path is established between PIL and PML along a transmission path that does not utilize any working path. 3. The initial and final segments of the backup path are linked to form an entire backup path. 4. When a failure occurs, the node that detects the failure reroutes incoming traffic by linking the upstream portion of the working path to the downstream portion of the backup path. In Fig. 1, when the node LSR7 fails, the working traffic is rerouted along the backup path, LSR5-3-1-2-4-6-8-9

MPLS Restoration Scheme Using Least-Cost Based Dynamic Backup Path

321

The merit of Haskin's scheme is that there is almost no packet loss during link/node failure. However, Haskin's scheme introduces re-ordering of packets in case that traffic is switched back from the backup path to the working path after a link/node goes up. MPLS Network LSR2

LSR4

LSR6

LSR8

Failure LSR1 (PIL)

LSR3

LSR5

Working Path Backup Path Failure/Restoration Signal Path

LSR7

LSR9 (PML)

• PIL : Protection Ingress LSR • PML: Protection Merging LSR

Fig. 1. Path restoration: Haskin's scheme and Makam's

In Makam's scheme, a backup path is established as follows: 1. A backup path is established between PIL and PML along a transmission path that does not utilize any working path. 2. When a failure occurs, the node that detects the failure sends a failure notification message toward its PIL. On receiving the message, PIL reroutes the incoming traffic through the backup path. In Fig. 1, when the node LSR7 fails, the working traffic is rerouted along the backup path, LSR1-2-4-6-8-9. The merit of Makam's scheme is that there is almost no problem in reordering of packets during link/node failure. However, Makam's scheme introduces packet loss because PIL doesn't execute the protection switching until it receives the failure notification message from a node that detect a link/node failure.

3 Dynamic Path Restoration Scheme The proposed scheme uses dynamic protection and local repair. In the proposed scheme, each node on working path has candidate nodes that may become an egress node of backup path. A backup path is established as follows: 1. The node that detected a failure calculates an explicit route between itself and a node out of the candidate nodes that is used as splicing node of backup path at the lease cost. 2. In setup of new backup path, the calculated explicit route is used as the ER(Explicit Route) of MPLS signaling message(e.g. CR-LDP, RSVP). For the purpose of splicing the existing working path and the backup path to be

322

G. Ahn and W. Chun

established, LSPID of working path is also used as a ER hop. The holding priority of working path may be used as setup priority of backup path. 3. As soon as the backup path is established, traffic on working path is switched to backup path. 4. If setup of backup path fails, go to 1.

Failure Detection

find Least-Cost Backup Path

try Setup of Backup Path

Success ?

No

Yes Protection Switching

Fig. 2. Procedure of path restoration procedure Least-Cost-Backup-Path (Src_node, Candidate_nodes, TParam) // Src_node is a node that detected a failure // // Candidate _nodes is a set of nodes that exist from the downstream node of failed node to the destination node in the direction of the working path // // TParam is the traffic parameter value of working LSP // least_cost Å ∞ best_backup_path Å nil for ( each splicing_node of Candidate_nodes ) do backup_path Å Get-CR-Path (Src_node, splicing_node, TParam) cost Å Get-Cost (backup_path) if ( cost ≤ least_cost ) then

best_backup_path Å backup_path least_cost Å cost

end end return least_backup_path end Least-Cost-Backup-Path

Fig. 3. Least-Cost-Backup-Path algorithm

Fig. 2 illustrates the procedure of restoration function briefly. Fig. 3 shows LeastCost Backup-Path algorithm. In Fig. 3, the parameter Candidate_nodes can be easily found in ER of CR-LDP(or ERO of RSVP) or Path Vector of LDP(or RRO of RSVP). The function Get-CR-Path can be easily implemented by using the existing algorithm such as Widest-Shortest Path Algorithm[6], Shortest-Widest Path Algorithm[14], and

MPLS Restoration Scheme Using Least-Cost Based Dynamic Backup Path

323

Shortest-Distance Path Algorithm[11]. The function Get-CR-Path is a function that calculates links delay or hop count of backup path. Hop count between LSR10 & 12 is 4

LSR10

LSR1

LSR21

Failure

LSR11

LSR2

LSR22

LSR12

LSR23

LSR13

LSR24

LSR14

Ma p Msping g

LSR20

LSR3

LSR4

Hop count between LSR10 & 13 is 3

CR-LDP Request Message { LSPID = 1001, FEC = 18 ER = {LSR2, 3, 13, L1000} TP = {bw=500K, bsize=10K) HoldPrio = 4, SetupPrio = 4 }

Property of Working Path • LSPID= 1000 • FEC = 18 • TP= {bw=500K,bsize=10K} • SetupPrio = 4

Fig. 4. Example for the proposed scheme

Fig. 4 is an example for the proposed scheme. When LSR11 fails, LSR10 that detected the failure calculates an explicit route for new backup path. The candidate nodes for the working LSP(LSPID 1000) in LSR10 are LSR12, 13, and 14. Assuming that hop count is used in calculating cost of backup path, cost from LSR10 to LSR12 is 4, cost to LSR13 is 3, and cost to LSR14 is 4. Because cost from LSR10 to LSR13 is the least of them, the explicit route for new backup path become LSR10-2-3-13. The calculated explicit route is used as ER of CR-LDP Request Message. The LSPID of working path, 1000 is used as its ER hop in order to splice the existing working LSP and new backup LSP. As soon as LSR10 receives a CR-LDP Mapping Message for the backup LSP, it reroutes traffic on working path to new backup path. If the link between LSR10 and LSR11 fails, the working traffic is rerouted along the backup path, LSR10-20-21-11. The proposed scheme has the following advantages: • High Resource Utilization -- because resource is not reserved beforehand. • Fast Path Restoration -- because a backup path with least cost can be selected by using the proposed algorithm. • Protection of Backup Path -- because backup path is handled in the same way as working path.

324

G. Ahn and W. Chun

4 Simulation and Performance Evaluation In order to simulate the proposed scheme, Haskin's and Makam's, we have extended MPLS Network Simulator[7]. MPLS Network Simulator supports the setup of CRLSP based on QoS as well as basic MPLS core functions such as label switching, LDP, CR-LDP, and various options of label distribution. 4.1 Simulation Environment Simulation environment is shown in Fig. 5. Node0 is IP node. The rest of the nodes are MPLS nodes. Each node is connected with a duplex link with the bandwidth 2Mbps, a delay of 10ms, and a CBQ queue. LSR1

LSR2

LSR3

LSR4

LSR5

Node0 Ä1

LSR6

LSR7

LSR8

LSR9

LSR10

LSR11

LSR12

LSR13

LSR14

LSR15

LSR16

LSR17

LSR18

LSR19

LSR20

LSR21

LSR22

LSR23

LSR24

LSR25

CBR

Traffic Source

• Working Path • Haskin’s Backup Path • Makam’s backup Path

&

Traffic Sink CBR

LSR26

Fig. 5. MPLS networks for simulation

There is one pair of UDP traffic, called CBR. Traffic is injected into Node0 and escape from LSR26. CBR generates 256-byte-long packets at 1Mbps and at constant bit rate. Each node is monitored every 10ms to protect the working path. In this simulation, we considered node failure instead of link failure as failure type for the purpose of simulating our scheme in worse environment because its performance is worse in node failure than in link failure 4.2 Simulation Results and Evaluation Several metrics are proposed for performance evaluation of path restoration schemes by [9][13]. Each scheme is measured and evaluated in terms of packet loss, reordering of packets, concurrent faults, and resource utilization. In our simulation, two kinds of traffic, best-effort traffic and QoS traffic are used as traffic to be protected. A working LSP and a backup LSP for best-effort traffic are

MPLS Restoration Scheme Using Least-Cost Based Dynamic Backup Path

325

setup by using an ER-LSP, which does not consider resource reservation but can utilize the rest bandwidth of the link. A working LSP and a backup LSP for QoS traffic are setup by using a CR-LSP, which is guaranteed the bandwidth required but can not utilize the rest bandwidth of the link.

NB of Dropped Packets

90 Haskin Makam Our Scheme

75 60 45 30 15 0 LSR6

LSR11

LSR16

LSR21 LSR22

LSR23 LSR24

Failed Node

(A) Best-effort traffic NB of Dropped Packets

90 75 60 45 Haskin M akam Our Scheme

30 15 0 LSR6

LSR11

LSR16

LSR21

LSR22

LSR23

LSR24

Failed Node

(B) QoS traffic Fig. 6. Packet loss in case of a node failure on working path

Fig. 6 shows a packet loss comparison of each scheme by the location of a failed node. Haskin's scheme and Makam's have a problem that the number of the dropped packets increases more in proportion to the distance between PIL(i.e. LSR1) and a LSR that detected a node failure, in QoS traffic and in best-effort traffic and QoS traffic, respectively. The proposed scheme also has a problem in packet loss. However, it has almost no connection with failure location in performance as shown in Fig. 6. Fig. 7 shows a packet re-ordering comparison of each scheme by the location of a failed node. Haskin's scheme has a problem that the number of the re-ordered packets increases more in proportion to the distance between PIL and a LSR that detected a node failure, in best-effort traffic and QoS traffic. Makam's has almost no problem in reordering of packets. The proposed scheme also has almost no problem in packet reordering as shown in Fig. 7.

326

G. Ahn and W. Chun

NB of Reordered Packets

90 Ha s k in M akam Our Schem e

75 60 45 30 15 0 L S R6

L S R1 1

L S R1 6

L S R2 1

L S R2 2

L S R2 3

L S R2 4

L S R2 3

L S R2 4

F a ile d No d e

(A) Best-effort traffic NB of Reordered Packets

90 Ha s k in M akam Ou r Schem e

75 60 45 30 15 0 L S R6

L S R1 1

L S R1 6

L S R2 1

L S R2 2

F a ile d No d e

(B) QoS traffic

NB of Resource-reserved Nodes

Fig. 7. Reordering of packets in case of a node failure on working path

16 12 8 Haskin Makam Our Scheme

4 0 0

1

2

3

4

5

6

7

NB of Failed Nodes

Fig. 8. Resource utilization: Resource-reserved nodes for backup path

Fig. 8 shows resource utilization comparison of each scheme by the number of failed nodes. In this simulation, resource means label, bandwidth, and buffer reserved for backup path. The proposed scheme shows the best performance than any other schemes in resource utilization. Fig. 9 shows a comparison of each scheme by the number of sequential and concurrent faults. In this simulation, node failures occur from PML toward PIL concurrently and sequentially. As shown in Fig. 9, both Haskin’s scheme and Makam’s have no connection with concurrent faults. In both schemes, the more the number of failed node increases the more the number of dropped packet decreases. This is because the more the number of failed node increases the closer to PIL the location of failed node is. The proposed scheme shows poor performance in

MPLS Restoration Scheme Using Least-Cost Based Dynamic Backup Path

327

concurrent faults. The reason is that the more the number of failed node increases the more the try count of LSP setup for backup path may increase. 240 NB of Dropped Packets

200

Haskin Makam Our Scheme

160 120 80 40 0 1

2

3

4

5

6

7

NB of Failed Nodes

(A) Best-effort traffic NB of Dropped Packets

240 Haskin M akam Our Scheme

200 160 120 80 40 0 1

2

3

4

5

6

7

NB of Failed Nodes

(B) QoS traffic Fig. 9. Concurrent faults on working path

Throughput (Kbps)

2000 Haskin Makam Our Scheme

1500

1000 500 0 0

1

2

3 Time (second)

4

5

6

Fig. 10. Node failure on both working path and backup path

Fig. 10 shows throughput of each scheme in case of both working path and backup path failure. In this simulation, a node failure on working path occurs at 2 seconds and a node failure on backup path occurs at 3 seconds. Those failures are recovered at 4 seconds. As shown in Fig. 10, only our scheme protects traffic of backup path as well as that of working path.

328

G. Ahn and W. Chun

5 Conclusion This paper proposed a dynamic path protection scheme using the least-cost based backup path, which may increase resource utilization and protect backup path without requiring longer restoration times. In this paper, two ideas in establishing backup path were proposed. One is candidate nodes that may become an egress node of backup path. The other is LeastCost Backup-Path algorithm used to find a node out of the candidate nodes that is used as splicing node of backup path at the lease cost. Simulation results show the performance of our scheme is better than or similar to that of the existing schemes in case of single failure. We are planing to simulate and evaluate the proposed scheme by using more comparison criteria such as 1:n protection in large MPLS networks.

References 1. Bilel Jamoussi, "Constraint-Based LSP Setup using LDP," Internet Draft, Oct. 1999. 2. Changcheng Huang, Vishal Sharma, Srinivas Makam, Ken Owens, "A Path Protection/Restoration Mechanism for MPLS Networks," Internet Draft, July 2000. 3. Daniel O. Awduche, Lou Berger, Der-Hwa Gan, Tony Li, Vijay Srinivasan, George Swallow, "RSVP-TE: Extensions to RSVP for LSP Tunnels", draft-ietf-mpls-rsvp-lsptunnel-08.txt, Feb. 2001 4. Dimitry Haskin, Ram Krishnan, "A Method for Setting an Alternative Label Switched Paths to Handle Fast Reroute," Internet Draft, May 2000. 5. Eric C. Rosen, Arun Viswanathan, Ross Callon, "Multiprotocol Label Switching Architecture," Internet Draft, April 1999. 6. . Apostolopoulos, D.Williams, S. Kamat, R. Guerin, A. Orda, and T. Przygienda, "QoS Routing Mechanisms and OSPF Extensions," RFC2676, August 1999. 7. Gaeil Ahn and Woojik Chun, "Design and Implementation of MPLS Network Simulator Supporting LDP and CR-LDP," IEEE International Conference on Networks(ICON2000), Singapore, Sep. 2000, pp. 441-446 8. Hae-Joon Shin, Youn-Ky Chung, Young-Tak Kim, "A Restoration Scheme for MPLS Transit Network of Next Generation Internet," in Proceeding of the 14th ICOIN, Taiwan, Jan. 2000, pp. 3D1.1-3D1.5. 9. Loa Andersson, Brad Cain, Bilel Jamoussi, "Requirement Framework for Fast Re-route with MPLS," Internet Draft, June 1999. 10. Nortel Networks, Ennovate Networks, IBM Corp, Cisco Systems, "LDP Specification," Internet Draft, June 1999. 11. Q. Ma and P. Steenkiste, " On Path Selection for Traffic with Bandwidth Guarantees," In Proc. of IEEE International Conference on Network Protocols(ICNP), Oct. 1997. 12. R. Callon at al., "A Framework for Multiprotocol Label Switching," Internet Draft, Sep. 1999. 13. Tellabs, Nortel Networks, AT&T Labs, "Framework for MPLS Based Recovery," Internet Draft, March 2000. 14. Z. Wang and J. Crowcroft, "Quality of Service Routing for Supporting Multimedia Applications," IEEE JSAC, 14(7):1228-1234, Sep. 1996.

Connection Management in MPLS Networks Using Mobile Agents 1

Sakir Yucel and Tuncay Saydam

2

1

Marconi Communications, 1000 Fore Dr. Warrendale, PA 15086 USA [email protected] 2 University of Delaware, Department of Computer and Information Sciences, Newark, DE 19716 USA [email protected]

Abstract. In this paper, the use of mobile agent technology for creating QoSdriven MPLS tunnels and LSP’s is investigated and an architectural framework to integrate related service and network management activities is proposed. Using a MIB definition, details of an example implementation for configuring MPLS network elements over CORBA and JAVA facilities are discussed. Critical evaluation of the proposed approach together with its advantages, issues and comparison to traditional connection management approaches is presented.

1. Introduction MPLS (Multiprotocol Label Switching) emerged as a new technology that sits between the network and the data link layers in the Internet architecture, enabling traffic-engineering capabilities to provide both qualitative and quantitative QoS. MPLS creates a connection below the IP layer, called the LSP (Label Switched Path), through which the traffic flows. MPLS will also offer better reliability and availability through the protection and restoration of LSPs. With these key capabilities and state of the art management architectures, as we propose in coming sections, service providers will be able to offer value-added services such as the IP based Virtual Private Networks (VPN's) with better than best-effort, in some cases, with guaranteed quality [1] [2]. Service management architectures are needed to effectively create, provision and manage services over different networking domains. Our methodology to manage complex services over MPLS networks will be based on distributed component oriented software engineering and on mobile agent technology. Our architecture is influenced by the CORBA, WEB, TMN and TINA-C frameworks. CORBA and WEB are the middleware environments for providing and accessing the value-added services easily with a comparable low-cost. TMN (Telecommunication Management Network) approach separates the service management from network management. TINA-C (Telecommunication Information Networking Architecture – Consortium) framework promotes development of reusable components for management of services over heterogeneous networks. Mobile code/agent technology enables to bring the management functionalities flexibly at the network element abstraction level. These functionalities include configuration of network elements with software plugP. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 329–338, 2001 © Springer-Verlag Berlin Heidelberg 2001

330

S. Yucel and T. Saydam

ins and mobile agents on the fly, creation of protocol layers and adapters, and even composition of protocol stacks actively with respect to the QoS requirements of the services running on top of the network elements. The Java Programming Language has become the basic choice for the mobile agent paradigm as a means to migrate the functionality into a network element and from one platform into another, due to its portability and dynamic loading features. However, use of mobile agent technology for creating MPLS tunnels and LSPs, to our knowledge, has not been investigated by researchers yet. In this research, we will propose an architecture that employ mobile agents to manage distributed services with different QoS constraints in MPLS networks and investigate the feasibility of using mobile agent technology in creating MPLS tunnels and LSPs based on service level requirements (SLAs).

2. General Architecture The architecture we are proposing is a collaborative framework bringing together the object-oriented technologies, mobile agent paradigm, telecommunication management standards such as TMN and TINA-C, and the networking technologies around the middleware solutions, as shown in Figure 1. The middleware solutions are CORBA, WEB and Java. Attached around the middleware are the end user systems, management systems, basic middleware services, agent repository servers and their managers, event servers and their managers, security servers and their managers, and the network elements. Each of these elements is accessible to one another through the use of either CORBA or WEB or both. End user systems belong to the customers who access and use the value-added services. The management systems belong to the value-added service and/or network service providers and help them offer services on top of the physical networks and network elements. The agent repository servers keep the directory of software units that can be dispatched by management systems and sent to network elements to perform dynamic management operations. The event collection and correlation server listens to the events emitted by the network elements, correlates them and notifies the management systems. The security servers provide fine-grained security mechanisms and security services over the middleware. The managers for the mobile component repository server, the event server and the security server perform the configuration of the respective servers. These managers, although not shown in Figure 1 due to space limitations, are also attached around the middleware bus. In other words, our architecture is a collaborative environment having everything as an object around the middleware bus, whereby each element runs the middleware software and is exported into the naming service. To support the seamless communication over middleware, each element contains Java Runtime Environment and runs a CORBA ORB application (usually via the Java Run-time environment). In addition to the CORBA process, management systems and the servers run Java servlets via the interface components to offer their services over the web using the HTTP protocol [7].

Connection Management in MPLS Networks Using Mobile Agents

331

Fig. 1. A Detailed Architecture for QoS-Driven Connection Management Using Mobile Agents The network elements (NEs) are physical devices such as an IP router, over which the network and value-added services are realized. As shown in Figure 1, an NE contains the device hardware, device drivers, the NE operating system, communication protocol stack, a management agent software (i.e. SNMP) and a MIB (Management Information Base). The latter contains the NE related attributes that could be monitored and modified. In this paper, we will assume that all the NEs are MPLS capable. To handle the diversity of today's NE devices, our framework places a unified abstraction on top of the basic NE so that we can handle different kinds of

332

S. Yucel and T. Saydam

them. For this purpose, the assumption we make about the network elements is the availability of Java Virtual Machine (JVM). By downloading some packages and classes dynamically into the JVM, we can make an NE a part of the middleware pool and implement variety of management tasks on it in a uniform manner, regardless of its hardware and software specifics. This way we can tackle the scalability and heterogeneity issues of the networking devices. On top of the NE abstractions, the management systems create network-level and service-level abstractions as well, that improves the scalability and the robustness of the resulting system. Most today’s networks elements, however, are not accessible through CORBA and are not capable of running JVM. Access to such network elements will be achieved via the SNMP, LDAP (Light-weight Directory Access Protocol), signaling protocols or command line interfaces, instead of CORBA. These communication mechanisms form a “network management middleware” for communicating with the network element in addition to the common middleware like CORBA and WEB. For NEs incapable of running JVM, element management systems will provide “agencies” to execute dynamic Java code, which will communicate with NEs using network management middleware communication mechanisms. Agent repository servers store many different kinds of objects. Three particularly important to be used in this paper are stationary agents, mobile agents and agent systems. A stationary agent (plug-in) is an object that can be uploaded to a management system or to an MLPS network element and stay at the platform where they were installed. A mobile agent (mobilet) is an autonomous active agent that travels over some managed platforms acting on behalf of a management system to perform some management tasks. Mobilets are autonomous and can be intelligent to make decisions on their own, i.e. what to do at the managed platform, where and when to move to another platform. Along the way, mobilets may report to the manager about the problems in the local managed platforms that they encounter. An agent system is an application or a thread with a set of Java language classes that can receive, authenticate, run and relocate agents. Both plug-ins and mobilets can carry serialized Java bytecode or they are described in XML. When plug-ins and mobiles are described in XML, agent systems instantiate them out of the XML description.

3. Connection Establishment Using Mobile Agents We are developing a proof-of-concept prototype system to investigate the research ideas with respect to the advantages, disadvantages, limitations and problems of mobilets in the field of distributed service management in general. Specifically for the purpose of this paper, the prototype should provide an environment for testing the suitability of mobile agent technology in establishing MPLS connections. The prototype system is specified and designed by using UML (Unified Modeling Language) and implemented with Java2 platform APIs, RMI and IDL-RMI packages, Java Reflection API, JavaBeans component model and the InfoBus. The repositories at the management systems and at the repository servers are implemented with JNDI (Java Naming and Directory Interface) over LDAP compatibly with DEN (Directory Enabled Network) and CIM (Common Information Model) design initiatives. The architecture makes extensive use of dynamic object and agent creation on demand employing document driven programming (DDP) techniques for constructing objects

Connection Management in MPLS Networks Using Mobile Agents

333

out of XML specifications [8]. Stationary and mobile agents are specified using XML. JAXP API is used for processing XML and implementing the DDP techniques. We are developing a number of connection management related plug-ins and mobile agents. These plug-ins and mobilets provide the functionality for connection establishment, connection reestablishment, connection information collection and connection release (teardown). In our previous work, we sketched the detailed algorithm for creating an ATM PVC using a Connection Establishment Mobilet (CEMob) [7] [9]. Similar to our ATM work, a CE-Mob can be programmed to create an LPS, a tunnel or a hierarchy of tunnels in an MPLS network. For the connection establishment in the following example, end-to-end LSP over a number of MPLS domains is to be created, with one CE-Mob for each MPLS domain creating an LSP within that domain. Currently, there is no standard MIB, similar to ATOMMIB, for MPLS router. There are, however, Internet drafts [3] [4] [5], as “work in progress”, that define managed objects for MPLS LSRs, for MPLS traffic engineering and for MPLS LDP (Label Distribution Protocol) respectively. We decided to base the implementation of a CE-Mob on the first two Internet drafts. New CE-Mobs can easily be programmed to work on different MIB definitions, or, an adapter object is installed to map the [4] MIB definitions into the proprietary MIB definition. First, we outline creation of LSP using in an MPLS domain using the [4] MIB definition. When the connection establishment mobilet arrives in an LSR, it goes through the following steps: (1) it specifies traffic parameters for both input and output segments, (2) it reserves and configures in and out segments, (3) cross connects the in and out segments, and (4) specifies label stack actions, if any. To perform the first action, mobilet should make sure there is enough bandwidth available in the router by comparing the required bandwidth with the mplsInterfaceAvailableBandwidth object of the mplsInterfaceConfTable table. If this comparison fails, the mobile agent may report this to its manager via the communicateMgmtInfo() method, depending on the error checking and reporting policy. For example, if the itinerary (the path) of the mobile agent was assigned by the connection management component, the mobile agent reports the situation and waits for the new itinerary from the manager. On the other hand, if the mobile agent is permissible for changing the connection path, it backtracks to the previous LSR to try another LSR. If there is enough bandwidth, the mobilet selects a new mplsTrafficParamEntry with {mplsTrafficParamIndex, mplsTrafficParamMaxRate, mplsTrafficParamMeanRate, mplsTrafficParamMaxBurstSize, mplsTrafficParamRowStatus, mplsTrafficParamStorageType} attributes, assigns a unique id to the mplsTrafficParamIndex, assigns the traffic parameters to the next th attribute. three attributes and assigns createAndGo(4) to the 4 mplsTrafficParamStorageType is left alone. Mobilet checks if this operation is successful or not. If not successful, it handles it likewise. If successful, it continues with the set up of mplsTrafficParamEntry for the output direction. After the traffic parameters have been specified, the mobilet creates in and out segment entries. For the in segment, mobilet creates an mplsInSegmentEntry with {mplsInSegmentIfIndex, mplsInSegmentLabel, mplsInSegmentNPop, mplsInSegmentAddrFamily, mplsInSegmentXCIndex, mplsInSegmentOwner, mplsInSegmentTrafficParamPtr, mplsInSegmentRowStatus, mplsInSegmentStorageType} attributes. It assigns the incoming interface number and the incoming label value to the first two attributes, respectively. mplsInSegmentNPop is assigned the number of labels to pop from the incoming packets,

334

S. Yucel and T. Saydam

mplsInSegmentOwner is assigned with part of the certificate of the mobilet to indicate that the owner of this LSP is the connection management component that deployed this mobilet. mplsInSegmentTrafficParamPtr is assigned with the index of the mplsTrafficParamEntry created for the in segment. Finally, mobilet assigns createAndGo(4) to the mplsInSegmentRowStatus attribute. Other attributes are left alone to their default values. The mplsInSegmentXCIndex attribute will be assigned the index of the cross connect entry later on. Mobilet handles the failure of this operation, if any, otherwise continues with the creation of out segment entry in a similar way. The next operation is the creation of cross connect entry for switching in and out segments. Mobilet creates an mplsXCEntry with { mplsXCIndex, mplsXCLspId, mplsXCLabelStackIndex, mplsXCIsPersistent, mplsXCOwner, mplsXCRowStatus, mplsXCStorageType, mplsXCAdminStatus, mplsXCOperStatus}attributes. mplsXCIsPersistent is assigned true if the LSP is desired to be automatically restored after a failure. Mobilet assigns values to appropriate attributes for associating in and out segments that it created. When done with it, mplsInSegmentXCIndex in the in segment and mplsOutSegmentXCIndex in out segment will be assigned to point to the newly created cross connect entry. Mobilet handles the failure of this operation similarly to above cases. If the operation is successful, it continues with specifying label actions, if any, otherwise it is done at this LSR and migrates to the next one in its path. If any label actions are to be specified, mobilet assigns the index of the mplsLabelStackEntry to the mplsXCLabelStackIndex attribute of the cross connect entry. An mplsLabelStackEntry is created with mplsLabelStackIndex and assigning the label value to mplsLabelStackLabel attribute. mplsLabelStackRowStatus is assigned createAndWait(4) similarly to create the entry. Upon success of this operation, the mobilet is done with this LSR and is ready to migrate to the next one with the help of the agent system. Operations in an LER is very similar to LSR except that the connection management component handles the last step for assigning label operations in LERs, as opposed to mobilet performing it in the core of the network in LSRs. Another CE-Mob is programmed to create an MPLS tunnel operating on the managed objects defined in [5]. Basically, this CE-Mob configures the attributes the objects such as mplsTunnelTable, mplsTunnelResourceTable, mplsTunnelHopTable in similar way to the example above.

4. Critical Evaluation and Conclusions Looking at the implementation example, we see that it is very difficult to justify the use of mobile agent technology based on dynamic code for creation of LSPs and tunnels as of today, as opposed to our conclusions for the ATM technology. Mobile agent approach is justifiable if mobile agent brings intelligence into the NE. As we see, example implementation on a proposed MIB definition doesn’t exhibit much intelligence other than making some failure handling. Obviously, we cannot see many of the benefits of applying mobile agent technology for PVCs here in creating LSPs. The reason is basically MPLS is in a very immature stage compared to ATM traffic management. MPLS doesn’t support delay constraints like CTD, CDV, CVDT as in

Connection Management in MPLS Networks Using Mobile Agents

335

ATM QoS specification and doesn’t impose queuing, buffering, scheduling, policing and shaping mechanisms (RSVP supports guaranteed service and controlled-load service via admission control, classifier and packet scheduler modules for applications requiring bounded delay or enhanced best effort services. However, these are still incomparable to ATM traffic management). In ATM, these are well-understood and well presented as configurable MIB objects, and mobile agent technology make use of these to create a PVC with optimum utilization of local switch resources. On the other hand, it seems the best a mobile agent can do in MPLS using an available MIB definition is not much different from what a signaling protocol does, which is essentially creating an MPLS with just the bandwidth reservations. Only few advantages over signaling and classical management provisioning are notable with this implementation. One is that mobile agent approach is flexible with respect to error checking and decision making within the network elements. For example, the mobilet can make adaptive decisions by itself, as to which route to select based on the requested QoS parameters and the availability of local resources. This minimizes the number of primitives passed between the management system and the network element, and therefore reduces the overall bandwidth requirement needed for connection provisioning. Mobile agent can make intelligent decision based on the characteristics, policies, constraints of the provisioned service and the available resources in the local element in selecting its route. Another is the improved scalability, by delegating the connection provisioning to an autonomous mobilet. Mobile agent approach for service management is usually remarkable, as in this case, in reducing the load of the management systems when they would be involved in many provisioned connections at the same time. Management system’s decision on whether to use signaling, classical provisioning or a mobilet is also based on the type of the LSP to be created. Although mobilets can be used in place of manual provisioning as well as signaling, their use should be justified since they introduce overhead. For P-LSP (permanent LSP spanning over long terms like days, weeks, more) and for SP-LSP (signaled permanent LSP), it would choose to deploy a mobilet that would map the customer SLA onto NE as well as the management policies if implementing some policies is desired. For S-LSP (Signaled LSP spanning over short term like minutes, hours) type of connections that don’t require QoS, it would use signaling protocols. If DiffServ is running over MPLS, management system (NMS) would create two types of LSPs, E-LSPs and LLSPs, using mobilets if bandwidth allocation is required during establishment. The first one, E-LSP, supports up to eight behavior aggregates for a given FEC with any number of ordered aggregates, where an ordered aggregate is a set of behavior aggregates that share an ordering constraint. NMS configures the EXP bits of the MPLS header to point to correct PHB for E-LSP type connections. With the second one, L-LSPs, a separate LSP is established for each of the forwarding equivalence class to ordered aggregate pair. Specifically implemented mobilets make these operations transparent to the management system. One of the many advantages of stationary and mobile agents is the ability to add new functionality on demand into a network element by downloading dynamic code from a directory server, i.e. repository server. In spite of many efforts, downloading mobile agent in the form of a dynamically loadable code as in Java at the network element level is still unfeasible at this time. Basically, network elements are not designed and engineered to support such agent execution environments (i.e. agent system) at all. Main control processors implement the control and management plane

336

S. Yucel and T. Saydam

functionalities in the most efficient way running specialized software on proprietary (i.e. CISCO IOS) or real-time operating systems (i.e. VxWorks, real-time Linux). For scalability purposes, destination lookup (based on IP, MPLS label, ATM VC/VP ids), prefix matching and packet classification as well as policing, marking, shaping and RM aggregation operations are implemented in the ingress hardware by special ASICs and/or network processors. The code for network processors is usually developed in microcode in its assembly language and optimized for efficiency reasons. Similarly, queuing, scheduling and other traffic management functions at the output side are performed usually by special ASICs. A dynamically loaded agent in an NE cannot do much, other than changing the configuration parameters of these ASICs. Besides, the idea of running a dynamically loadable code of Java or spawning a new object out of XML definition in the main switch/router processor is nonsense in the views of equipment vendors because their main concern is to be able to run their own code in the hardware rather than someone else’s dynamically loadable code. On the other hand, command line scripting is usually supported by the equipment vendors and is widely utilized by service providers for configuration and diagnostics of network elements. We believe, an agent approach based on command line scripting rather than dynamically loadable code for configuration of LSRs and LERs to create LSPs and tunnels is a more feasible approach than having dynamic Java code. This approach can be realized in the form of uploading scripts on designated LEs, or migrating a script around the NEs to be configured. Scripting eliminates the operator effort to manually create tunnels and LPSs over a set of LSRs. Scripts are written for equipments of different vendors to configure their proprietary features and configuration parameters as opposed to programming mobile agent code in Java to work with those proprietary characteristics. Basically, it doesn’t come with the overhead of providing an agent execution environment and the security issues related to dynamic code loading. Our architecture efficiently supports storing, querying and deploying such mobile agents as well. If we go into this direction, we can still specify the plug-ins and mobilets in XML but it is required to translate the action part of agent’s XML description into the command line scripts of the destination platforms. Scripting, however, doesn’t introduce new functionality but utilizes the available ones in the NE. Placing agencies that can provide agent execution environment near network elements is another way of introducing dynamic functionality into the network. Element Management stations and hosts in equipment rooms are perfect candidates for these agencies. This way, agent execution environments are created in a more flexible operating system (i.e. Linux and UNIX stations found in the equipment rooms). The mobile agent in the form of dynamically loadable Java bytecode travels over the agencies in a system and communicates with the network elements via some communication mechanism (i.e. SNMP, LDAP, signaling, scripting). The agencies make it possible to introduce new functionality by installing some stationary agents, such as an agent implementation of bandwidth broker and exporting them to CORBA naming service. Employing policy agents into the network is another immediate application of this approach. Our framework also perfectly supports this approach.

Connection Management in MPLS Networks Using Mobile Agents

337

Mobile agent based connection establishment has a direct impact on performance. Some of the main issues regarding performance are: • For time-critical and short-term connection management, our architecture's added overhead may not be suitable. In such as situation, a signaling protocol based connection establishment would be preferred. • Management systems interact with the servers during the service creation. However, some servers will not be used for every time a connection requested. The specific deployment of the architecture should be done in such a fashion that the communication overhead could be reduced. For example, anticipated mobile agents should be downloaded and cached in advance to reduce the need to access the repository server. • Mobile agents distribute functionalities and bring them to nodes where they are needed. They reduce network traffic around the management systems compared to classical management-agent paradigm. On the other hand, mobile agent paradigm adds overhead and complexity in terms of the management of the mobile agents. The more autonomous the agents are, the heavier they become. Mobile agents should be leanly constructed, and their data and protocol needs should provided by the agent systems. • It is feasible to create agencies at the EMSs (in Figure 1) providing agent execution environments for both stationary and mobile agents, thus, introducing dynamic functionality into the network. Also, it is feasible to deploy mobile agents in the form of command-line scripts to configure the LERs and LSRs in an MPLS enabled network for traffic engineering and management purposes. However, our architecture has several important advantages over the classical connection management approaches. Some observations are: • In a service involving multiple networks, parallel and independent execution of mobile agent, in separate domains, improves the performance significantly. There is also the flexibility in providing different QoS requirements in different networks by use of mobile agents. • Our architecture is not optimal for a small simple network. However, nowadays, end-to-end applications traverse multiple complex and heterogeneous networks, thereby requiring services that can only be supplied through hierarchical architectures. • The agent-based connection approach makes the implementation of complex QoS-dependent service contracts much simpler. • QoS driven connections add distinct value to services. However, they need extra service interactions among the user, the network and the service providers. • Mobile agents provide local flexibility in selecting routes, evaluating node resources and aggregating QoS. The mobile agents could be implemented to map the given service level QoS parameters onto the MIB objects of the network elements in the most optimum way. The required knowledge for the node's specific needs shift from the classical manager onto a mobile agent. Therefore the specific details of network nodes become more transparent to management systems.

338

S. Yucel and T. Saydam

References 1. MPLS Working Group, http://www.ietf.org/html.charters/mpls-charter.html 2. MPLS Forum, http://www.mplsforum.org/ 3. Cucchiara, J., Sjostrand, H., Luciani, J., “Definitions of Managed Objects for the Multiprotocol Label Switching, Label Distribution Protocol (LDP)”, Internet draft, draftietf-mpls-ldp-mib-07.txt 4. Srinivasan, C., Viswanathan, A., Nadeau, T. “MPLS Label Switch Router Management Information Base Using SMIv2”, Internet draft, draft-ietf-mpls-lsr-mib-07.txt. 5. Srinivasan, C., Viswanathan, A., Nadeau, T. “MPLS Traffic Engineering Management Information Base Using SMIv2”, Internet draft, draft-ietf-mpls-te-mib-06.txt. 6. Java Products and API, http://java.sun.com/products/ 7. Yucel,S. Saydam,T., Mayorga,A. “A QoS-driven Connection Management Architecture Using Mobile Agents”, under review. 8. Yucel,S. Saydam, T. “SLA Specification Using XML for Services Over IP Technologies”, under review. 9. Yucel,S. Saydam.T., "QOS Management of Multimedia Services Using ATM MIB Objects", Journal of Networking and Information Systems, vol2, n2, July 1999.

General Connection Blocking Bounds and an Implication of Billing for Provisioned Label-Switched Routes in an MPLS Internet Cloud George Kesidis1 and Leandros Tassiulas2 1

EE and CS&E Depts, Pennsylvania State University University Park, PA, 16802, USA [email protected] 2

E&CE Dept, University of Maryland College Park, MD, 20742, USA [email protected]

Abstract. Two related problems of traffic shaping are considered in this paper. Both are applicable to the context of provisioned MPLS labelswitched routes. The first involves a novel application of traffic shaping to connection-level arrival processes. A type of Erlang-B bound is derived. The second involves the transmission of secondary best-effort data traffic into a provisioned variable bit-rate (VBR) “channel” handling a primary (real-time) flow.

1

Introduction

In this paper, we consider an MPLS label-switched route (LSR) with explicitly provisioned bandwidth. In this first part of this paper, we suppose that a number of separate connections are using the LSR. A traffic shaper is applied to the connection arrival process to control connection blocking. A bound similar in function to the Erlang-B is derived for an M/GI/∞ queue and its utility is explored. In the second part of this paper, we suppose that the provisioned LSR is used by a single (perhaps aggregated) connection with two leaky bucket constraints on the packet-level flow, as would be the case in ATM’s VBR or diffserv’s Assured Forwarding (AF) traffic classes. A simple method for moving best-effort (BE) packets within (i.e., “inband”) the LSR is described. A condition on billing which makes this practice profitable is also given.

2

Connection-Level Shaping to Obtain Connection Blocking Bounds

We consider the problem of reducing the number of blocked connections in an Erlang-type loss network. One extreme is not to inhibit the arriving traffic (conP. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 339–347, 2001. c Springer-Verlag Berlin Heidelberg 2001 

340

G. Kesidis and L. Tassiulas

nection set-up requests) at all; this leads to blocking probabilities given by Erlang’s formula for the case of a network of M/M/C/C queues [6,14]. The other extreme is to put a queue at each source (network access point) and have the connections wait until a circuit is available. In this case, a connection is never blocked. However, this requires complex network monitoring of available circuits and constant communication with the network access points. Also, connection set-up delay may be excessive. The approach proposed in this paper is somewhat of a compromise. We suggest the use of traffic shapers at the network access points that make “smooth” the arrivals so that the servers receive connection requests at more regular intervals, thus decreasing the chances of call rejection. This method does not need any network information. However, connection requests may experience an additional delay in the shaper queue. We study the tradeoff between queuing delay and blocking probability via simulations. In Figure 1, a “single node” situation is depicted. Let M (s, t] be the number of connection set-up requests (simply called “connections”) that arrive to the shaper during the continuous time interval (s, t]. The shaper can queue up to K connections. If a connection arrives to the shaper to find it full (i.e., K connections queued), the connection is blocked. Let N (s, t] be the number of connections departing the shaper over (s, t].

arriving connection set-up requests

M

g shaper

N

Bg connections blocked

C server system

released connections

BC connections blocked

Fig. 1. A traffic shaper followed by a C-server loss system

The shaper operates so that N (s, t] ≤ g(t − s) a.s. for all t ≥ s where g is a strictly increasing function on R+ such that g(0) = 1 and g(0−) ≡ 0. Using tandem leaky buckets we can, for example, implement g(x) = max{1 + πx, σ + ρx} for x ≥ 0 where σ > 1 and 0 < ρ < π. The scenario of Figure 1 is also relevant to ATM virtual path (VP) switching and to label-switched routes (LSRs) in a MPLS Internet domain. In both cases, connections may be set up by “servers” in the context of limited available capacity. For a specific example, consider a LSR which has been set-up through an

General Connection Blocking Bounds and an Implication of Billing

341

MPLS domain using an RSVP-type protocol so that the LSR is assigned a finite amount of bandwidth B. The LSR is used by a “service” provider for connections each requiring a bandwidth b  B. The number of “circuits” or “servers” of this LSR is simply C = B/b. The use of the traffic shaper also allows us to study the problem of connection blocking for a very wide variety of connection arrival processes. In modern communication network settings, the incident traffic M is often unknown and difficult to predict. Note that the shaper does not take into account the potential holding times of the connections. When a connection is blocked by the shaper, the corresponding user would quickly receive a “fast busy signal”. A less desirable situation occurs if the user’s connection set-up request passes through the shaper (at the expense of some delay) only to be blocked by the “C-server system”. We now focus on the C-server system. This system has no associated queue. For the time being, we consider a G/G/C/C system with arbitrary interarrival and service distributions. The ith connection arrives to this system at time Ti and has duration (holding time) Si , i.e., if this connection is not blocked and obtains a server, it will occupy the server for Si seconds. Further suppose that all the connections have a maximum holding time (duration) S max ≤ ∞, i.e., for all i, Si ≤ S max a.s. Finally, assume that all holding times are identically distributed. If g(S max ) ≤ C, then the C-server (G/G/C/C) system will never block connections [3,10]. Now consider a G/GI/∞ system with connection arrival process N (identical to that of our C-server system in Figure 1) and i.i.d. connection holding times. Let Q be distributed as the steady-state occupancy of this infinite server system. We approximate the connection blocking probability of the C-server system by P(Q > C). In [10] we showed that EQ ≤ Eg(S) and, using the Chernoff inequality, we further showed that    ∞ θ P(Q > C) ≤ exp − sup{θC − log(Φ(γ)e + 1 − Φ(γ))dγ} (1) θ>0

0

where Φ(x) ≡ P(g(Si ) > x). It was demonstrated in [2] that an improper choice of shaper parameters could lead to greater blocking and/or excessive set-up delay; indeed, in an extreme situation, one can arrange for the shaper queue to be unstable. To avoid this, sample measurements of the arriving traffic (M ) could be used to estimate parameters such as the mean arrival rate λ. These estimated parameters could then be used to tune the shaper parameters into an appropriate regime which is stable in particular. We also tested a modified version of the leaky bucket shaper with finite connection buffer in which connections were presented to the C-server system without tokens whenever the shaper itself was about to block a connection. With this modified shaper, overall blocking probabilities were obtained that were close to the “overflow” probabilities of the infinite server case (1) and the delay performance was similar to the “unmodified” shaper with a finite connection buffer.

342

3

G. Kesidis and L. Tassiulas

An Implication of Pricing on a Single Provisioned Connection

We now shift our focus to a single connection (circuit). We assume that the packets of this connection are “delay sensitive” and that they are transmitted at a variable bit-rate. We further assume that bandwidth and buffer memory has been explicitly provisioned for this connection and that the traffic is “shaped” as it enters the network. Unlike the previous section, the traffic is taken to be a stream of fixed-length packets instead of a stream of connection set-up requests. More specifically, suppose a user has purchased a rate-regulated channel (perhaps as an MPLS LSR) specified by the traffic descriptors (σ, ρ, π) and qualityof-service (QoS) parameters (ε, δ) which are interpreted as follows. For any interval of time (s, t), the total number of packets transmitted by the user in that interval, A(s, t), must satisfy A(s, t) ≤ min{σ + ρ(t − s), 1 + π(t − s)}

(2)

where σ > 1 has dimensions packets and 0 < ρ < π have dimensions packets/s, i.e., A is both (σ, ρ) and π-peak-rate “constrained”.1 In addition, the end-toend delay D experienced by a typical packet of the connection must satisfy P(D ≥ δ + Π) ≤ ε where Π + δ > 0 is a critical delay threshold and Π represents the deterministic end-to-end propagation and processing delays. Let d = D − Π. Assume that the cumulative queueing delay experienced by the packets in the network backbone is negligible [12], i.e., the only significant queueing delay is at the network access point. Alternatively, assume that the cumulative queueing delay in the network backbone can be bounded by a small constant (that would be a component of Π) as is the case when “guaranteed-rate” scheduling is used in the backbone switches, see [8,9] and the references therein. Let c be the allocated amount of bandwidth for the connection. Therefore, we can represent the QoS requirement of the connection as P(d ≥ δ) ≤ ε

(3)

where d is interpreted as the delay through a queue with constant service rate c packets/s. Invoking a recent “worst-case” bound for a corresponding “fluid” queue (see [11] and the references therein), we get the following inequality: P(d ≥ δ) ≤

σ − ζ −1 δc c ρ σ − δc

(4)

where ζ = (π − c)/(π − ρ) < 1 (the queueing delay d is deterministically bounded above by ζσ/c). We can therefore equate

1

σ − ζ −1 δc =ε c ρ σ − δc

(5)

In IETF guidelines, σ and ρ are known as the token buffer size and token rate, respectively. In ATM standards, σ and ρ are known as the sustainable packet rate (SCR) and (roughly) the maximum burst size (MBS), respectively.

General Connection Blocking Bounds and an Implication of Billing

343

and solve for the worst-case bandwidth allotment c of the VBR channel specified by (2) and (3). 3.1

General Pricing Framework for Connections

Now consider an arbitrary connection in a communication network. The user’s cost in dollars is [7,16] α + βT + γN = α + (β + γm)T where α ≥ 0 is the fixed connection set-up cost in dollars, T is the total time duration of the call in seconds, N is the total number of packets, and m = N/T is the mean rate of transmission in packets/s. The quantities β and γ will also vary according to the time of day, day of the week, etc. In addition, the quantity β [$/s] may depend on the declared traffic descriptors. Indeed, let r represent the “worst-case” a priori required allocation of bandwidth resources, e.g., obtain r from the solution c to (5). In this paper, we will use the more general pricing formula α + f (r, m)T where the function f has the simple property that it is jointly nondecreasing in both arguments. 3.2

Transmission of Data Inband

The user transmits a primary delay-sensitive traffic stream A1 that satisfies (2). Assuming no usage-based costs, the user has an incentive to add a secondary best-effort traffic stream A2 . For example, the primary stream might consist of a sequence of video frames and the secondary stream might consist of data (e.g., email). In the following, we will explain how the user can add the secondary stream so that: the aggregate stream A1 + A2 also satisfies (2), the QoS of A1 is not affected, and the duration of the connection T does not change. A simple condition on f will now be found that will determine whether the best-effort process A2 is cheaper to transmit as a secondary process in a rateregulated channel or as a primary process in a separate best-effort connection. Suppose that the average primary transmission rate is m1 cells/s and that the total primary transmission is N1 cells, i.e., A1 (0, T ) = N1 and m1 T = N1 . Assuming that the set-up cost of a best-effort connection is negligible, the total cost quantities that are to be compared are α + f (r1 , m1 + m2 )T and α + f (r1 , m1 )T + f (0, m2 )N2 = α + (f (r1 , m1 ) + f (0, m2 ))T. Thus, if and only if the following condition is holds, it is cheaper to transmit best-effort cells as a secondary stream in a shared rate-regulated channel: f (0, m2 ) > f (r1 , m1 + m2 ) − f (r1 , m1 ).

(6)

For the case where f (0, m) ≡ γm, this condition can be expressed as: γ>

∂f f (r1 , m1 + m2 ) − f (r1 , m1 ) ≈ (r1 , m1 ) m2 ∂m

(7)

344

G. Kesidis and L. Tassiulas

where the last approximation holds when m2 is relatively small. Note that if the cost per unit time does not depend on the usage (m), the right-hand-side of (7) is zero and, consequently, (7) holds. There is significant debate as to whether usage-based pricing for the Internet is feasible or “scalable”. Under (7) we will now explain how the user can add the secondary stream to the primary one without affecting the QoS of the primary cells or incurring additional cost. Take time to be slotted where the time-duration of each slot is π −1 seconds. By ensuring that no more than one cell per slot is transmitted, we ensure that the peak-rate constraint is not violated. Now consider an emulated queue operating in discrete time with the unit of discrete time being π −1 seconds. The arrival process is A = A1 + A2 and the constant service rate is ρ/π cells per unit time (ρ cells/s). Let X be the occupancy of this queue at slot n. Let di the departure time (in slots) of the ith cell to arrive to the queue and let ai be the arrival time of this cell. We interpret the constant service rate of the queue X in the following way: ρ di = Fi where Fi = max {ai , Fi−1 } + π and F0 = 0. Note that, if the ith cell arrives to an empty queue, di = ai + ρ/π . We also have that [8]   X(n) = max A[m, n] − ρ(n − m + 1) . 0≤m≤n

Similarly, let X1 be the occupancy of the queue with arrivals A1 and constant service rate ρ. The quantity σ − X1 (n) is the slackness in the (σ, ρ) constraint of A1 at time n. We want to add the secondary cells so as not to cause a cell of the primary process A1 to violate the (σ, ρ) constraint sometime in the future, i.e., we do not want the addition of a secondary to cause a future primary cell to arrive when X = σ (when the emulated queue is full). Consider the busy periods and idle periods of X1 . Let I represent the total length of all the idle periods of X1 . A simple approach would be to add secondary cells during the idle periods of X1 so that the busy periods of X1 are not “affected”. Note that this requires knowledge of when the next busy period of X1 is to begin and, consequently, is a “slightly” noncausal rule for inserting secondary cells. Because the allocated bandwidth in the network c > ρ, the busy periods of the primary cells will be contained in those of the corresponding queue serviced at rate c; therefore, the primary cells will otherwise not be affected by the insertion of secondary cells in this manner. Let A02 represent the maximal secondary arrival process constructed this way. Claim: For any secondary arrival process A2 that does not cause the duration T of the VBR connection to increase, N2 ≡ A2 (0, T ) ≤ A02 (0, T ) = ρI. Proof: Suppose a secondary cell is inserted during a busy period at (empty) slot n. The busy period of X will consequently be extended by π/ρ slots

General Connection Blocking Bounds and an Implication of Billing

345

(1/ρ seconds) and X will increase by one from n to just before the end of the (extended) busy period, see Figure 2. Since we require that the total duration of the VBR connection not be extended, we can insert at most ρI secondary cells. 

X after data cell insertion after time n

n

busy period extends by π/ρ slots after insertion of a data cell

X prior to data cell insertion after time n

Fig. 2. Effect of inserting a best-effort cell

So, the simple method of inserting A02 is optimal, requires minimal knowledge of future arrivals of primary cells, and does not change the maximum of X, i.e., does not cause the traffic constraint (2) to be violated (assuming the primary transmission satisfies (2)). Therefore, transmission of A02 is recommended. To summarize, our two required conditions for inserting a secondary cell at time n are: 1. no primary cell is transmitted in the nth slot. 2. X1 (m) = 0 for all m ∈ [n, d] where d is the departure time of the cell inserted at time n, d = n + ρ/π . Note that by transmitting A02 , the queue X (with arrival process A = A1 +A02 ) has a single busy period encompassing all of [0, T ]. So, even if the connection was allowed to be slightly extended in duration by the insertion of best-effort cells, only an additional σ cells could be inserted in [0, T ] before the maximum value of X exceeds σ, i.e., the (σ, ρ) constraint is violated. We also note that the emulated queue mechanism (X1 ) required for the above two conditions may already be present in the user’s traffic shaper. Finally, best-effort data can also be transmitted in-band in a CBR channel. The rule is simpler because only step 1 above is required. The received QoS of the primary traffic using the CBR channel is not affected because the network basically allocates peak rate, i.e., c = π. To evaluate the throughput of best-effort traffic using in-band insertion, consider again the queue X1 defined above. A classical result of queueing theory states that [1] P(X1 = 0) = 1 − m1 /ρ ≈ I/T in steady-state, where the approximate equality is basically an “ergodicity” assumption on X1 . So, over this duration, roughly ρI = ρT (1 − m1 /ρ) = T (ρ − m1 ) best-effort cells are inserted in-band by the method described above. Thus, the throughput of best-effort cells is ρ − m1 cells/s. Clearly, by (2), m1 ≡ A1 (0, T )/T ≤ ρ + σ/T . The quantity σ/T

346

G. Kesidis and L. Tassiulas

is expected to be negligibly small since σ represents the a maximum number of primary cells in short term “burst”. Thus, m1 ≤ ρ. For the “extremal” process A1 [11] that achieves the bound (4) subject to (2) and (3), m1 = ρ and P(X1 = 0) = 0. So, as expected, an extremal primary transmission would leave no room for the insertion of best-effort cells since there is no unused bandwidth capacity. Some authors have considered the problem of choosing suitable standard traffic descriptors for a given trace of VBR (typically video) traffic, see, e.g., [17]; but, for pre-recorded video, piecewise-CBR service has been argued [13,15]. Of course, for real-time flows, the user may not have a priori knowledge of the mean transmission rate m1 . Moreover, the high degree of statistical complexity of real-time VBR traffic [5,4] is often not capturable by the standard traffic descriptors. Thus, the user may choose ρ conservatively larger than m1 and, thereby, allow a substantial amount of best-effort cells to be transmitted in-band. Finally, we note that existing model-based techniques for connection admission control of VBR flows may be compromised by inband data transmission. With inband data, VBR flows are “smoother” and, therefore, less statistical multiplexing gains may be achievable by the network.

4

Summary

Two related problems of traffic shaping were considered. Both are applicable in the context of MPLS label-switched routes. The first involved a novel application of traffic shaping to connection-level arrival processes. A type of Erlang-B bound was derived. The second involved the transmission of secondary best-effort data traffic into a provisioned variable bit-rate (VBR) “channel” handling a primary (real-time) flow. Acknowledgements We wish to thank K. Chakraborty for the simulation results of Section 2 and M. Beshai of Nortel Networks for his sponsorship.

References 1. F. Baccelli and P. Bremaud. Elements of Queueing Theory. Springer-Verlag, Application of Mathematics: Stochastic Modelling and Applied Probability, No. 26, New York, NY, 1991. 2. K. Chakraborty, L. Tassiulas, and G. Kesidis. Reducing connection blocking likelihoods by traffic shaping. Technical report, University of Maryland I.S.R. Technical Report, 2000. 3. R.L. Cruz. Quality of service guarantees in virtual circuit switched networks. IEEE JSAC, Vol. 13, No. 6:pages 1048–1056, Aug. 1995. 4. M.W. Garret and W. Willinger. Analysis, modeling and generation of self-similar VBR video traffic. In Proc. ACM SIGCOMM, pages 269–280, 1994.

General Connection Blocking Bounds and an Implication of Billing

347

5. D. Heyman, A. Tabatabai, and T.V. Lakshman. Statistical analysis and simulation study of video teleconferencing traffic in ATM networks. IEEE Trans. Circuits and Systems for Video Tech., Vol. 2, No. 1:pages 49–59, March 1992. 6. F.P. Kelly. Effective bandwidths of multi-class queues. Queueing Systems, Vol. 9, No. 1:pp. 5–16, 1991. 7. F.P. Kelly. Charging and accounting for bursty connections. In Internet Economics (Editors L.W. McKnight and J.P. Bailey), pages 253–278. MIT Press, 1997. 8. G. Kesidis. ATM Network Performance. Kluwer Academic Publishers, Boston, MA, Second Edition, 1999. 9. G. Kesidis. Scalable resources management for MPLS over diffserv. In Proc. SPIE ITCom 2001, Denver, CO, Aug. 2001. 10. G. Kesidis, K. Chakraborty, and L. Tassiulas. Traffic shaping for a loss system. IEEE Communication Letters, Vol. 4, No. 12:pp. 417–419, Dec. 2000. 11. G. Kesidis and T. Konstantopoulos. Extremal traffic and worst-case performance for a queue with shaped arrivals. In Analysis of Communication Networks: Call Centres, Traffic and Performance, edited by D.R. McDonald and S.R.E. Turner, Fields Institute Communications/AMS, ISBN 0-8218-1991-7, 2000 (proceedings of the Nov. 1998 conference at the Fields Institute, Toronto). 12. E. Livermore, R.P. Skillen, M. Beshai, and M. Wernik. Architecture and control of an adaptive high-capacity flat network. IEEE Communications Magazine, pages 106–112, May 1998. 13. J.M. McManus and K.W. Ross. A dynamic programming methodology for managing prerecorded VBR sources in packet-switched networks. Telecommunications Systems, 9, 1998. 14. K.W. Ross. Multiservice Loss Models for Broadband Telecommunication Networks. Springer-Verlag, London, 1995. 15. J. Salehi, Z.-L. Zhang, J. Kurose, and D. Towsley. Supporting stored video: Reducing variability and end-to-end resource requirements via optimal smoothing. In ACM SIGMETRICS, May 1996. 16. D. Songhurst and F.P. Kelly. Charging schemes for multiservice networks. In ITC15, Washington, DC, V. Ramaswami and P.E. Wirth (Editors), pages 781–790. Elsevier Science, B.V., 1997. 17. P.P. Tang and T.-Y. C. Tai. Network traffic characterization using token bucket model. In Proc. IEEE INFOCOM’99, New York, April 1999.

FPCF Input-Queued Packet Switch for Variable-Size Packets Peter Homan and Janez Bester University of Ljubljana, Faculty of Electrical Engineering, Trzaska 25, SI-1000 Ljubljana, Slovenia {Peter.Homan, Janez.Bester}@fe.uni-lj.si

Abstract. The existing forward planning conflict-free (FPCF) packet switches are designed for fixed-size packets and synchronous operation mode. In this paper an asynchronous FPCF packet switch for variable-size packets is proposed. The key problem of efficient packet insertion procedure was solved by introduction of a so-called quasi-synchronous record array arrangement. A performance evaluation based on simulations is provided in terms of throughput, delay and loss probability. The limited maximum switch throughput is a deficiency of the presented asynchronous FPCF packet switch. In most cases, utilization of over 90% can be achieved by using multiple traffic flows, while preserving proper packet order. Maximum packet delays are comparable to those produced by output-queued packet switches. By comparing FPCF and virtual-output-queued packet switches a conclusion is drawn that FPCF switch produces both, lower maximum packet delays and lower packet delay variations.

1 Introduction Output-queued (OQ) packet switches are most suitable for quality-of-service (QoS) deliverance [1]. There is however a high price to pay for fast switching fabric [2]. Input-queued (IQ) packet switches can be used to avoid switching-fabric speedup [1], [3]. In most existing IQ packet switches first-in first-out (FIFO) queues are used. In order to prevent head-of-line blocking events, a so-called virtual-output-queuing (VOQ) queue configuration is usually implemented – rather than maintain a single FIFO queue for all packets, each input maintains a separate FIFO queue for each output [2]. Another way to achieve high throughput in IQ packet switches is by using forward planning conflict-free (FPCF) queuing policy [4]. Fig. 1 depicts a generic FPCF packet switch architecture. It was designed for fixed-size packets and synchronous operation mode. The essential idea is that by using an FPCF algorithm, the outputcontention problem at the input of the switching fabric can be entirely eliminated. Any possible conflicts are resolved before the newly received packets are inserted into appropriate FPCF queues. Newly received packets can be inserted at any position inside FPCF queues. All packets inside FPCF queues are periodically shifted toward the switching fabric at the end of each time-slot. FPCF switches have one distinctive advantage in comparison to FIFO IQ switches – the total packet delay is known P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 348–357, 2001 © Springer-Verlag Berlin Heidelberg 2001

FPCF Input-Queued Packet Switch for Variable-Size Packets

349

immediately after the packet is inserted into the FPCF queue and the worst case packet delay is limited by the FPCF queue size B and the switching fabric transfer speed.

1



B FPCF queue N N

1



FPCF queue 1

NxN non-blocking switching fabric

N

Packet insertion



1



B

N

Fig. 1. Generic FPCF packet switch architecture

In this paper we propose a modified version of FPCF queuing policy that is capable of switching variable-size packets. A complete performance evaluation based on simulations is provided in terms of throughput, delay and loss probability. The reminder of this paper is organized as follows. Sect. 2 introduces the modified version of FPCF queuing policy. Sect. 3 presents packet switch simulation. First the methodology in use during the switch performance analysis is revealed, followed by simulation results. Sect. 4 concludes this paper.

2 Asynchronous FPCF Queuing Policy for Variable-Size Packets Basic characteristics of synchronous FPCF algorithm for fixed-size packets, as described in [4], apply here as well. However, there are two important modifications: the asynchronous operation mode and variable packet sizes. Asynchronous operation mode implies that each newly received packet is inserted into the appropriate FPCF queue immediately after being received. In synchronous operation mode all packets form all inputs were inserted at one instance of time on the rotation priority basis. In asynchronous operation mode packets are inserted on a first-come first-serve (FCFS) basis. Asynchronous operation mode was selected due to variable-size packets. Different packets require different amount of FPCF buffer size and different amount of time for transfer across the switching fabric, which makes synchronous operation mode difficult to implement. Packets can be inserted into any position inside FPCF queues. Moreover, packets can occupy any size between specified minimum and maximum values. Time and size granularities are virtually eliminated by using arbitrary real-time numbers. Fig. 2 depicts an example of asynchronous FPCF packet switch with 3 input and 3 output ports. Numbered rectangles indicate already inserted packets, while shaded areas indicate free space. Numbers inside rectangles determine the packets' output ports. With variable-size packets the packet insertion procedure complicates. FPCF algorithm keeps records of all occupied places inside each FPCF queue. In order to

350

P. Homan and J. Bester

expedite the packet insertion procedure, additional records of already booked transmission periods are kept at each output port [4]. To find an appropriate place for newly received packet, cross sections of both, FPCF record array at appropriate input port and output record array at appropriate output port must be derived. The search is started at the beginning of FPCF queue i.e. at the switching fabric input ports, and is executed in the direction of packet switch input ports i.e. toward the end of FPCF queue. New packet is inserted into the first sufficiently wide cross-section.

2 3

2 3

1 2 1 2

3

3 2 1

3 2 1 2

1 2 3

1 3x3 non-blocking switching fabric

FPCF queues 1 1 3 2 2

3

2 3

Newly received packets

Fig. 2. Asynchronous FPCF packet switch for variable-size packets, N = 3

There are two new problems, which did not appear in synchronous FPCF packet switches for fixed-size packets. The first one is decrement of maximum switch throughput. It is a direct consequence of unexploited areas inside FPCF queues. Due to both, variable-size packets and asynchronous operation mode, many cross-sections are too small to be appropriate for packet insertion. Thus, maximum switch throughput of 100% cannot be expected. The second new problem is packet overtaking. As can be readily seen, smaller packets can swiftly find a suitable crosssection. Larger packets are usually compelled to search further toward the end of FPCF queue to find an appropriate cross-section. This is especially true when switch is heavily loaded. We could say that FPCF switch favors smaller packets – a traffic flow with smaller average packet size will likely to achieve higher throughput, lower delays, and lower packet loss probability. Packet overtaking can be prevented by keeping position records of last inserted packets. Unfortunately, by doing so the maximum switch throughput is additionally decreased. As a compromise, traffic can be logically separated into several traffic flows, while maintaining a single FPCF queue per input port. Overtaking is then allowed only between different traffic flows. Within each traffic flow, proper packet order is preserved. This way both, high maximum switch throughput and proper packet order can be achieved. 2.1 Fast Packet Insertion Algorithm Finding an appropriate cross-section for variable-size packets is not a trivial task. At each input port an array of records is preserved. One record for each queued packet is maintained. Each record holds two notes. The first one indicates the time when packet's transfer across the switching fabric will commence and the second one indicates the time when this transfer will be concluded. Similarly, at each output port

FPCF Input-Queued Packet Switch for Variable-Size Packets

351

an array of records is preserved. One record for each packet to be transferred to this output port is maintained. Just as with input ports, each record holds two notes with the above mentioned data. A straightforward search algorithm can be used to find a suitable cross-section. As is turns out, this algorithm is too slow, even for non-realtime simulation purposes. We developed a new algorithm to expedite the packet insertion procedure. The key invention is a so-called quasi-synchronous record array arrangement, as presented in Fig. 3. Like before, an array of records is preserved at each input and output port. However, the number of records in each array is fixed set by the FPCF queue size B and thus independent of the number of currently queued packets. Packet sizes, though variable, are usually limited with minimum and maximum values. Let us assume that the minimum packet size is set to 1 size unit. Let us also assume that the switchingfabric transfer speed is set to 1 size unit per time unit, i.e. a packet with size 1 would require 1 time unit to be completely transferred across the switching fabric. Let us imagine to parcel out the FPCF queue into a number slots with size equal to the minimum-sized packets. For example, if FPCF queue can concurrently accommodate at most 100 minimum-sized packets, it would be parceled out into 100 slots. Naturally, the real FPCF queues are left intact. However, this slotted arrangement is applied in record arrays. To look back to the previous example, each array would contain 100 records. Each record contains status and time information. Status can be either free, bottom, top or occupied. Free indicates that the slot is completely empty. Bottom indicates that the slot is partially empty, from the beginning of the slot until the specified time. Top also indicates a partially empty slot, from the specified time to the end of the slot. Occupied indicates either that a slot is completely full or that the slot is partially filled from both upward and downward directions and thus unfit for additional use. The time information is used in combination with top and bottom states, to demarcate the boundary between free and occupied space.

Free

Bottom

Occupied

Occupied

Top

Free

Occupied

Occupied

Occupied

Occupied

Top

Free

Record status

Toward the switching fabric

Fig. 3. Quasi-synchronous record array arrangement

Packet insertion algorithm maintains its own clock that is adjusted to the minimum packet size and switching-fabric transfer speed, e.g. in our example the clock is set to 1 time unit. At the end of each time slot, the records are shifted by one step toward the switching fabric. Records in front are discarded and new, empty records are added at the end of arrays. Records in front are then marked as transmitting and thus unavailable (occupied). The packet insertion procedure is invoked upon the arrival of each new packet. In the first step the required number of slots to accommodate the newly received packet

352

P. Homan and J. Bester

is determined, e.g. for a packet with size 4.14, at least 5 slots are required. Then a simple linear search algorithm is invoked to find cross-section of appropriate size. First slot can be either free or top. Intermediate slots must all be free. The last slot can be either free or bottom. Then the actual cross-section size is determined by considering time information in the first and last record. If the actual size is sufficient, packet is inserted and records' statuses are updated. Otherwise, the procedure is continued toward the last record of the array.

3 Packet Switch Simulation 3.1 Methodology The primary goal of simulation is to study the behavior of our proposed FPCF queuing policy for variable-size packets. For comparison reasons, VOQ and OQ packet switches are simulated as well. Oldest packet first [2] scheduling mechanism is selected for scheduling purposes in VOQ packet switch. A simple queue configuration with a single FIFO queue per output port is used in QO packet switch. A switch configuration with N input and N output ports is selected, and a nonblocking switching fabric is assumed in all switch architectures. All investigated packet switches operate in asynchronous mode – when a packet is completely transferred across the switching fabric a new path through the switching fabric is established and the transfer of a new packet is started immediately. New packets arrive at inlets following N identical and independent source processes. A uniform reference pattern of arrivals is assumed, i.e. the destinations of packets are uniformly distributed over the set of N outlets. A uniform packet size distribution is used. Packet inter-arrival times are exponentially distributed around mean value, which is calculated with regard to the specified offered switch load and average packet size. It should be noted however that packet arrival rate is limited by the switch input-line rate. Therefore, if input line is already occupied, a newly generated packet is delayed inside a traffic source until the input line becomes available. Limited input-line rate can be considered as a simple traffic shaper. Throughout our simulation the normalized units are used. Normalized transmission speeds of input lines, input ports, switching fabric, output ports, and output lines are all set to 1. A single exception is the switching-fabric transfer speed in OQ packet switch, which is set to infinity to completely eliminate the output-contention problem. The minimum and the maximum packet sizes are set to 1 and 10, respectively. Therefore, a newly generated packet can occupy any size between 1 and 10. Queue sizes are also expressed in normalized units. For example, a queue with a normalized size 2000 can concurrently deposit at most 200 packets with normalized size 10. Normalized time unit can be readily defined by using normalized transmission speed and normalized packet size. For example, a packet with normalized size 1 requires 1 normalized time unit to be fully transmitted across the output line. The following performance measures are used: − (normalized) throughput, defined as the sum of normalized sizes of all received packets per outlet, divided by the normalized duration of the simulation,

FPCF Input-Queued Packet Switch for Variable-Size Packets

353

− packet loss probability, defined as the probability that a new packet arrives at an inlet when the queue for that inlet is full, − mean packet delay, defined as the average of the time intervals form when a new packet arrives at an inlet to when it is delivered to its outlet, − maximum packet delay, defined as the maximum of the time intervals form when a new packet arrives at an inlet to when it is delivered to its outlet. All simulation results presented in this paper were obtained using Modsim III, an object-oriented simulation language from CACI. Simulation results were obtained by simulating the steady-state behavior of these systems and by applying the replication method, as explained in [5]. Simulations were repeated until switch throughput and mean packet delay measures achieved or exceeded the required level of relative precision (1%) at the 95% confidence level. During each simulation execution at least 6 10 packets were generated, setting the minimum detectable packet loss probability to -6 10 or smaller. 3.2 Maximum Throughput Results The purpose of the first set of experiments was to study the influence of various parameters on the maximum throughput of the proposed asynchronous FPCF packet switch. In the first experiment the influence of FPCF queue size parameter B was investigated. Switch size parameter N was fixed set to 10. Packet overtaking was allowed. The results are presented in Table 1. As expected, while increasing the FPCF queue size, the maximum switch throughput is increased as well. However, for large FPCF queues the throughput increment is small. For example, when FPCF queue size is increased from 100 to 1000, the maximum switch throughput is increased for 13%, and when FPCF queue is increased from 1000 to 3000, the maximum switch throughput is increased for only 2.1%. Table 1. Maximum switch throughput versus FPCF queue size B, N = 10, overtaking allowed

FPCF queue size: Max. throughput (%):

100 81.5

300 87.9

1000 92.1

3000 94.0

Next, the influence of switch size parameter N was investigated. FPCF queue size parameter B was fixed set to 1000. Packet overtaking was allowed. The results are presented in Table 2. The highest maximum switch throughput is obtained for small switch sizes. While increasing the switch size, the maximum switch throughput is decreased. However, for large switch sizes the throughput decrement is small. For example, when switch size is increased from 3 to 10, the maximum switch throughput is decreased for 4.4%, and when switch size is increased from 30 to 100, the maximum switch throughput is decreased for only 0.8%. Table 2. Maximum switch throughput versus switch size N, B = 1000, overtaking allowed

Switch size: Max. throughput (%):

3 96.3

10 92.1

30 90.4

100 89.7

354

P. Homan and J. Bester

Finally, the influence of packet overtaking prohibition was investigated. It can be readily seen that the chances for successful packet insertion are higher when packet overtaking is allowed, since packet can be inserted into any appropriately wide crosssection. With packet overtaking prohibited, a newly received packet must be inserted after the previously inserted packet of the same traffic flow. Overtaking can still occur between packets destined to different destinations. In our simulation a traffic flow is defined as a sequence of packets originating at the same input port and destined to the same output port. This traffic flow can be further divided into several independent traffic flows. In this case, although packets have the same origin and destination, a packet overtaking can occur between different traffic flows. Within each traffic flow a proper packet order is still preserved, however. In the extreme case, when the original traffic flow is divided into infinite number of independent flows, each packet becomes independent, which is exactly the situation if packet overtaking is allowed. Table 3. Maximum switch throughput versus number of traffic flows, N = 10, B = 1000, overtaking prohibited

Number of flows: Max. throughput (%):

1 82.6

3 87.0

10 90.0

30 91.4

100 92.0

• 92.1

Simulation results are presented in Table 3. The highest maximum switch throughput is obtained when infinite number of traffic flows are used, i.e. when packet overtaking is allowed. While increasing the number of flows, the maximum switch throughput is increased. However, for large number of flows the throughput increment is small. For example, when the number of flows is increased from 1 to 10, the maximum switch throughput is increased for 9.0%, and when the number of flows is increased from 30 to 100, the maximum switch throughput is increased for only 0.7%. 3.3 Switch Comparison Results The purpose of the next set of experiments was to compare the characteristics of different switch types: OQ, VOQ, and FPCF. Three different scenarios were selected to study the behavior of FPCF packet switch: − FPCF with single traffic flow and overtaking allowed (FPCF, 1, ON), − FPCF with five traffic flows and overtaking prohibited (FPCF, 5, OFF), − FPCF with single traffic flow and overtaking prohibited (FPCF, 1, OFF). A switch configuration with 10 input and 10 output ports was selected. The total queue size was set to 20.000 units in all simulated models. For VOQ this meant 200 units per queue, and for FPCF and OQ it meant 2000 units per queue. A performance evaluation was provided in terms of throughput, delay and loss probability versus offered switch load. Both, OQ and VOQ packet switches achieve near 100% switch throughput. Following maximum switch throughput results were obtained for FPCF packet switches: 93.8% when using single traffic flow and packet overtaking allowed, 88.8%

FPCF Input-Queued Packet Switch for Variable-Size Packets

355

when using five traffic flows and packet overtaking prohibited, and 82.7% when using single traffic flow and packet overtaking prohibited. Packet loss probability was investigated in the next experiment. It was already -6 mentioned that during each simulation run, any packet loss probability of 10 or higher was detected. Any smaller packet loss probability would produce zero loss results. Indeed, no packet loss was detected right until the offered switch load approached the maximum switch throughput values to a few percents. In cases where offered switch load was higher than maximum switch throughput, the measured packet loss probability was in accordance to the surplus of offered switch load. Mean packet delay results are presented in Table 4. At light and medium loads, below 70%, FPCF packet switch delivered mean packet delays comparable to those generated by OQ or VOQ packet switches. At higher loads but before the maximum switch throughput was reached, FPCF mean packet delays were about 3 to 5 times higher in comparison to those produced by OQ or VOQ packet switches. A distinctive increase of packet delays appeared when the offered switch load exceeded the maximum switch throughput. Nevertheless, packet delays inside FPCF packet switches were explicitly limited by the FPCF queue size and the switching fabric transfer speed. Therefore no packet could be delayed for more than 2000 time units inside our simulated FPCF packet switch. This axiom is even more evident in Fig. 4, where simulation results for maximum packet delays are presented. Indeed, to assure QoS for delay-sensitive traffic, maximum, i.e. worst-case packet delays must be kept under control. Table 4. Mean packet delay versus offered switch load

Switch type OQ VOQ FPCF, 1, ON FPCF, 5, OFF FPCF, 1, OFF

Offered switch load (%) 30 50 70 80 7.5 9.4 13.7 19.2 8.0 11.7 20.6 32.2 9.1 16.4 45.0 104 9.1 16.5 45.7 111 9.1 16.5 49.0 176

Table 5. Maximum packet delay versus offered switch load

Switch type OQ VOQ FPCF, 1, ON FPCF, 5, OFF FPCF, 1, OFF

Offered switch load (%) 30 50 70 80 54 70 119 214 80 126 350 507 58 84 159 330 58 84 170 357 58 84 171 532

Maximum packet delay results are presented in Fig. 4 and Table 5. At medium loads, FPCF packet switches delivered maximum packet delays comparable to those generated by OQ packet switches. FPCF maximum packet delays were thus only half the maximum packet delays produced by VOQ packet switches. At higher loads but before the maximum switch throughput was reached FPCF packet switches still delivered lower maximum packet delays in comparison to those generated by VOQ

356

P. Homan and J. Bester

packet switches. While FPCF maximum packet delays were explicitly limited, VOQ maximum packet delays could rose to very high values, as shown in Fig. 4.

Maximum packet delay

5000

4000

3000

2000

1000 90

0 60 OQ

VOQ

70 FPCF, 1, ON

FPCF, 1, OFF

80 FPCF, 5, OFF

Packet switch type

100

Offered switch load (%)

50

Fig. 4. Maximum packet delay versus offered switch load

4 Conclusions We started this paper by describing the motive for application of input-queued packet switches. We further presented the properties of synchronous FPCF packet switches for fixed-size packets. These switches have an inherent capability to support delaysensitive traffic, which is a feature rarely seen by input-queued packet switches. The main purpose of this paper was the introduction of asynchronous FPCF packet switches for variable-size packets and the investigation of their characteristics. By using a discrete-event simulation engine maximum switch throughput values were delivered. By using the same method, packet loss probability, mean packet delay and maximum packet delay values were delivered as well. One of the major problems that had to be resolved was to devise an efficient packet insertion algorithm for asynchronous FPCF packet switches for variable-size packets. The problem was solved by introduction of a so-called quasi-synchronous record array arrangement. The devised packet insertion algorithm is sufficiently fast for simulation purposes. Its feasibility for implementation in real FPCF packet switches is yet to be investigated.

FPCF Input-Queued Packet Switch for Variable-Size Packets

357

Simulation results confirmed our predictions that FPCF packet switches could be modified to operate in asynchronous mode and to switch variable-size packets. Truly, mean packet delays are higher in comparison to those produced by OQ and VOQ packet switches. However, maximum packet delays of FPCF packet switches are comparable to those produced by OQ packet switches and thus lower in comparison to delays generated by VOQ packet switches. This is especially beneficial for delaysensitive traffic. By comparing FPCF and VOQ packet switches we conclude that FPCF switches produce both, lower maximum packet delays and lower packet delay variations. It must not be forgot that the maximum packet delays inside FPCF switches are always explicitly limited. This is especially important when switch congestion occurs, since the possibility of excessive packet delays is virtually eliminated. The limited maximum switch throughput and thus the limited switch utilization is one of the drawbacks of the presented asynchronous FPCF packet switches. Actual switch utilization depends on various parameters: switch size N, FPCF queue size B, and number of traffic flows. Packet overtaking is another new problem that must be eliminated, unfortunately at the cost of additional switch utilization decrement. However, a switch utilization of over 90% can usually be achieved by using multiple traffic flows, while preserving proper packet order. We presume that using more sophisticated packet insertion algorithms could increase the switch utilization. This subject is for further study. We conclude this paper with the statement that FPCF packet switches are well suited for transfer of delay-sensitive information, regardless of whether fixed-size packets or variable-size packets are employed.

References 1. Nong, G., Hamdi, M.: On the Provision of Quality-of-Service Guarantees for Input Queued Switches. IEEE Commun. Mag. 12 (2000) 62-69 2. Krishna, P., Patel, N.S., Charny, A., Simcoe, R.J.: On the Speedup Required for WorkConserving Crossbar Switches. IEEE J. Select. Areas Commun. 6 (1999) 1057-1065 3. McKeown, N., Mekkittikul, A., Anantharam, V., Walrand, J.: Achieving 100% Throughput in an Input-Queued Switch. IEEE Trans. Commun. 8 (1999) 1260-1267 4. Yau, V., Pawlikowski, K.: An Algorithm That Uses Forward Planning to Expedite ConflictFree Traffic Assignment in Time-Multiplex Switching systems. IEEE Trans. Commun. 11 (1999) 1757-1765 5. Akimaru, H., Kawashima, K.: Teletraffic: Theory and Applications. 2nd edn. SpringerVerlag, Berlin Heidelberg New York (1999)

A Cost-Effective Hardware Link Scheduling Algorithm for the Multimedia Router (MMR) M.B. Caminero1 , C. Carri´ on1 , F.J. Quiles1 , J. Duato2 , and S. Yalamanchili3 1

2

Department of Computer Science. Universidad de Castilla-La Mancha. 02071 - Albacete, Spain. {blanca, carmen, paco}@info-ab.uclm.es Department of Information Systems and Computer Architecture. Universidad Polit´ecnica de Valencia. 46071 - Valencia, Spain. [email protected] 3 School of Electrical and Computer Engineering. Georgia Institute of Technology. Atlanta, Georgia 30332-0250. [email protected]

Abstract. The primary objective of the Multimedia Router (MMR) project is the design and implementation of a compact router optimized for multimedia applications. The router is targeted for use in cluster and LAN interconnection networks, which offer different constraints and therefore differing router solutions than WANs. One of the key elements in order to achieve these goals is the scheduling algorithm. In a previous paper, the authors have proposed a link/switch scheduling algorithm capable of providing different QoS guarantees to flows as needed. This work focuses on the reduction of the hardware complexity necessary to implement such algorithm. A novel priority algorithm is presented, and its hardware complexity is compared to that of the original proposal. Keywords: Communications switching, multimedia communications, Quality of Service, performance evaluation

1

Introduction and Motivation

The Multimedia Router (MMR) project is aimed at the design and implementation of a compact router optimized for multimedia applications. The goal is to provide architectural support to enable a range of quality of service (QoS) guarantees at latencies comparable to state-of-the-art multiprocessor cut-through routers. At the core of the MMR, there is one key element to provide QoS guarantees to the multimedia flows: the link and switch scheduling algorithm. The authors have recently proposed a link and switch scheduling algorithm, based on the 

This work was partially supported by the Spanish CICYT under Grants TIC97– 0897–C04 and TIC2000-1151-C07-02

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 358–369, 2001. c Springer-Verlag Berlin Heidelberg 2001 

Link Scheduling in the Multimedia Router (MMR)

359

concept of biased priorities [1,4,10] that is well suited to parallelization and pipelining [11]. The key point in this scheme is that priorities are biased according to the ratio between the QoS a flit is receiving and the one it should receive. This approach combines the effect of the scheduler (measured as the delay or the jitter experienced by a flit in the queue) with the QoS requirements (measured as the bandwidth requested by the connection). One of the proposed biasing functions was Inter-Arrival Biased Priority (IABP). With this algorithm, the priority of a flit is computed as the ratio between the queuing delay, and the inter-arrival time for the flits in the connection. The effect is that the priority grows as queuing delay grows. Moreover, priority grows faster for those flits belonging to high-bandwidth consuming connections, that is, there are more chances that they will be forwarded sooner through the switch. IABP has been shown to be able to guarantee QoS to flows with a wide range of bandwidths requirements, and timing constraints. But its main drawback is the complexity needed to implement this algorithm. The reason is that a division must be performed to compute priority. The purpose of this work is to introduce a simpler version of the IABP algorithm. This new algorithm, known as SIABP (Simple-IABP ) retains the idea behind IABP, but makes its implementation much simpler and compact. As a priority computing engine is needed for each virtual channel in the MMR, this reduction will significantly contribute to the overall simplicity and speed of the router. The rest of the paper is organized as follows. Next section describes the main architectural issues of the Multimedia Router. Then, the resource scheduling algorithms are outlined. Next, a description of the new proposed algorithm to compute priority is presented, followed by a comparison of the hardware requirements for the original and new algorithms. The paper concludes with some performance results obtained with CBR and VBR traffic, and some conclusions.

2

Multimedia Router Architecture

The general organization of the Multimedia Router is shown in Figure 1-a. The key issues regarding its architecture are summarized in the following paragraphs. The interested reader is referred to [3] for a more detailed description of the MMR, as well as the design trade-offs. Switching technique. The MMR uses a hybrid approach, where the most suitable switching technique is used for each kind of traffic: a connection-oriented scheme (Pipelined Circuit Switching [5,6]) for the multimedia flows, and Virtual CutThrough for best-effort messages. Input buffers. For each connection, a virtual channel is provided. This means that a large amount of buffers will be needed. In order to optimize their implementation, the buffers are organized as modules of RAM memory, interleaved with a simple scheme (see Figure 1-b). HOL-blocking [8] is also avoided in this way.

360

M.B. Caminero et al.

RAM

Buffer

RAM

Buffer

RAM

Buffer

Phit Buffers

Phit Buffers

Buffer

Routing and Arbitration Unit

RAM Address Generator

(a) Router architecture

mux

Control Word Decoder

demux

Mux Mux

Mux

Mux

Switch Scheduler

Physical Output Links

VCM+LS

Switch

Mux

VCM+LS

Mux

VCM+LS

Mux

Physical Input Links

VCM+LS

Mux

VCM - Virtual Channel Memory LS - Link Scheduler

From Link Scheduler

(b) Virtual Channel Memory Organization

Fig. 1. MMR Architecture

Flow control. The MMR uses credit-based flow control [9], to avoid the need for large buffers. InfiniBand [7] has also selected this flow-control method. Multiplexed crossbar. Due to the large number of virtual channels, a multiplexed crossbar is the most feasible implementation. Arbitration is needed at the input side (link scheduling), to select one virtual channel from each physical channel, and within the switch (switch scheduling), because several input channels might request the same output link. Arbitration is made concurrently with flit transmission, and considers the QoS requirements of the connections. Flits are synchronously forwarded through the crossbar. Large flits. Large flits are needed to pay off for the overhead introduced by flow control, and will also help to hide arbitration delay and amortize crossbar reconfiguration delay.

3 3.1

Resource Scheduling Algorithm Bandwidth Allocation

Link bandwidth and switch port bandwidth are split into flit cycles. Flit cycles are grouped into rounds also referred to as frames. The number of flit cycles in a round is an integer multiple K (K > 1) of the number of virtual channels per link. Bandwidth for a connection is allocated as an integer number of flit cycles. The allocated flit cycles will be assigned to the requesting connection every round. 3.2

Scheduling Algorithm

Link and switch scheduling are partitioned into a set of basic decisions: candidate selection, port ordering, and arbitration. Candidate selection is performed during link scheduling. The candidates are the C virtual channels from a physical link (1 ≤ C ≤ N , N = number of ports)

Link Scheduling in the Multimedia Router (MMR)

361

whose head flits have the highest priorities. These candidates are forwarded to the switch scheduler, which computes a conflict-free matching among input and output ports, in a way motivated by chances for parallelization and pipelining. All the candidates selected by every port are arranged into a selection matrix, according to their priority value. A conflict vector is used to help to select the output port with less non-matched higher priority requests in the port ordering phase. In the arbitration step, if there are several potential matches for an input port, the candidate with the highest priority is selected. See [11] for more details.

4

The Simple-IABP (SIABP) Link Scheduling Algorithm

In our previous switch scheduling proposal [11], link scheduling was performed by using the concept of biased priorities [1,4,10]. The priority value for each flit was related to the QoS requested by the connection, and was biased depending on the QoS received by it. One of the proposed biasing functions was IABP (InterArrival Based Priority). With IABP, the priority value was computed as the ratio between the queuing delay experienced by the flit, and the Inter-Arrival Time (IAT) specified for the connection. Results showed that this approach provides good performance for CBR traffic, differencing the QoS received by each type of connection. The main problem with the IABP algorithm is the way priorities are computed, since a division is needed for every virtual channel. Hardware implementations of dividers are slow and expensive, and hardly fit into our fast, compact router. So, an alternate algorithm has to be devised. The idea is to apply the same rationale introduced by IABP, that is, relate the bandwidth required by the connection with the experienced queuing delay, but replacing the division with some other operation faster and cheaper to implement. In the new algorithm, called SIABP (Simple-IABP ), the priority value for each head flit is computed in a different way. The queuing delay for the flit is stored as a counter that is incremented in each router cycle, that is, the queuing delay is expressed as a number of router cycles. The priority biasing function is performed as follows. The initial value for the priority is the bandwidth required by the connection. Instead of representing this by the IAT of the connection, the number of slots per frame reserved to service the average bandwidth of the connection is used. The advantage of this approach is that this magnitude is an integer value. It must be noted that computing the ratio between the queuing delay and the IAT (as IABP does) is equivalent to compute the product between the queuing delay and the bandwidth requirements. But if the product could be replaced with some shift operation, the implementation would be much simpler. So, the priority value is shifted to the left (that is, it is multiplied by two) each time the queuing delay value becomes greater than 1, 2, 4... 2n , that is, each time a bit in the queuing delay counter is set for the first time since it was last reset. In this way the QoS needed (represented by the initial priority value) is also related to the QoS received by the flit (the queuing delay).

362

4.1

M.B. Caminero et al.

Hardware Requirements

(a) IABP algorithm

Bandwidth

Counter

(b) SIABP algorithm

Fig. 2. Block diagrams for the studied algorithms

PRIORITY

Counter

PRIORITY

Reset

Bandwidth

Divider

Reset

SIABP module

To assess the simpler implementation of the SIABP algorithm, a VHDL [17] description has been done for both IABP and SIABP algorithms. Figure 2 shows the hardware blocks necessary for both priority computing engines. Every virtual channel in the router needs one of these blocks to compute the priority of their head flits. Both algorithms use a counter to store the queuing delay, which is incremented in every router cycle, and reset when a new flit enters the input buffer. MMR routers with a single flit buffer per virtual channel have been considered [2]. Extension to consider multiflit buffers is straightforward, since the only element to be replicated is the counter that stores the queuing delay (one per flit is needed). A register to store the bandwidth requirements of the connection is also needed. This will be represented by the IAT (Inter-Arrival Time) of the connection for the IABP algorithm, and by the number of flit cycles reserved within a frame for that connection, in the case of the SIABP algorithm. In order to compute priorities, the IABP algorithm uses a standard divider module, while the SIABP module uses a special module called SIABP module. The pin-in and pin-out of this module and an outline of its internal logic are shown in Figure 3 for 4-bit priority values. Its purpose is to take into account the bandwidth requirements and perform the shift operation when needed. Results have been computed for 16 bit-wide priority values, which suffice to represent the range of priorities needed. These modules have been synthesized with the Synopsys design tool [16], in order to get implementation details. The synthesis process has used the libraries provided by Europractice, MIETEC 0.35 µm. The implementation of the IABP algorithm was based on a 32-bit integer divider, provided by the design kit DesignWare [15], in order to get a lower bound estimation of the complexity of the IABP algorithm. The IABP algorithm is formulated to work with floating point magnitudes. Estimated delay for the IABP logics is 155.87 nsecs, while the SIABP implementation shows a delay of 4.07 nanosecs, that is, the SIABP algorithm shows a delay around 38 times lower than that achieved by the IABP algorithm. In terms of silicon area, the reductions are also dramatical: 272.56 µm for the SIABP algorithm versus the 6101.33 µm needed by the IABP implementation. This means a reduction of around 22 times in silicon area.

Link Scheduling in the Multimedia Router (MMR)

363

Fig. 3. 4-bit SIABP module pin-in and pin-out and internal logic

Now, it is necessary to assess that QoS guarantees are not threatened by this reduction in hardware complexity. Performance analysis is presented in next section.

5

Performance Evaluation

The configuration used in simulations is composed of a single MMR router, with a Network Interface Card (NIC) attached to each input link. The traffic sources inject their flits into buffers located in the Network Interface Card (NIC) (see Figure 4). These buffers are considered to be infinite because the host main memory can also be used if the NIC buffers become full. Credit-based flow control governs the transmission of flits from the NIC buffers to the corresponding MMR virtual channel buffer.

MUX

...

MUX + LC

...

...

SOURCES

Physical Link

DEMUX

Multimedia Router

Network Interface Card

To the crossbar port

Virtual Channel Memory

Flit buffers

(small flit buffers)

(infinite) LC : Link Controller

Fig. 4. Conceptual representation of the NIC and MMR buffers

Simulations have been run for a 4 × 4 router, with 128 virtual channels per physical link. 1.24 Gbps 16 bit-wide links have been considered. This imposes a router cycle of 12.9 nanosecs. The switch scheduler is based on a selection matrix, with 4 levels of candidates [11]. Buffer size is set to 1 flit per virtual

364

M.B. Caminero et al.

channel inside the MMR [2]. NIC buffers, on the other hand, are regarded as infinite, since the host memory could be used in case of necessity. Tests using CBR and VBR traffic have been carried out. All the connections are considered to be active throughout all the simulation time. Their destination is chosen randomly, among the output ports of the router. The results are presented in the following subsections. 5.1

Evaluation with CBR Traffic

For the CBR tests, workload was composed of a random mix of connections belonging to three different types, depending on their bandwidth requirements:{64 Kbps, 1.54 Mbps, 55 Mbps}. That is, connections with low, medium, and high bandwidth requirements have been considered. Simulations were run for 400 scheduling cycles. Results related to the QoS received by the connections are shown in Figures 5, 6, and 7. The first ones plot respectively the average flit delay and jitter for the most and least bandwidth consuming connections, while the latter one shows the distribution of flit delays, in order to know how many flits suffer from delays shorter than a certain deadline. The considered deadlines are multiples and submultiples of the IAT (Inter-Arrival Time) of every flow. Both algorithms are able to provide QoS guarantees with workload level up to 81% of link bandwidth. What is more, when the router enters saturation, performance degrades more gracefully with SIABP than with IABP. It can be seen that the overall performance of the SIABP algorithm is similar to the one achieved by the IABP algorithm for the 55 Mbps connections, whereas medium and low bandwidth connections get better performance. This is due to the fact that with SIABP, lower bandwidth connections get their priority value increased faster than with IABP, specially while queuing delay is not too big. So, the average delay experienced by their flits is lower, and they are likely to be considered sooner for scheduling. Anyway, this does not affect significantly the performance achieved by the other flows. Recall that every time a priority value is updated, it is multiplied by two, and that priority values are doubled less frecuently as queuing delays increase. With IABP, priority is increased more continuously but more slowly when queuing delays are not too big. These results are rather encouraging, because not only the complexity of the priority computing engine is reduced, but also performance is enhanced. This must be assessed by testing the algorithm with VBR traffic. 5.2

Evaluation with VBR Traffic

Performance evaluation of the proposed algorithm with VBR traffic is presented in this subsection. The VBR traffic models used in our simulations are based on MPEG-2 video traces. This is a typical type of multimedia flow. MPEG-2 video coding standard [14] encodes the video streams as a sequence of different frame types, I, P, and B, ordered with a prefixed and repetitive pattern, called GOP (Group Of Pictures). Every 33 milliseconds, a frame must

Link Scheduling in the Multimedia Router (MMR) IABP SIABP

160

Average delay (microsec)

Average delay (microsec)

180

140 120 100 80 60 40

365

IABP SIABP

32

24

16

8

20 50

55

60

65

70

75

80

85

90

95

50

55

60

Generated load (%)

65

70

75

80

85

90

95

Generated load (%)

(a) 0.064 Mbps connections

(b) 55 Mbps connections

Fig. 5. Average flit delay since generation IABP SIABP

80

4.5

Average flit jitter (microsecs)

Average flit jitter (microsecs)

90

70 60 50 40 30 20 10

4

IABP SIABP

3.5 3 2.5 2 1.5 1 0.5

50

55

60

65 70 75 80 Generated load (%)

85

90

95

50

(a) 0.064 Mbps connections

55

60

65 70 75 80 Generated load (%)

85

90

95

(b) 55 Mbps connections

IABP SIABP IAT 1016

2031

4062 8125 16250 Thresholds (millisec)

32500

65000

(a) 0.064 Mbps connections (94 % workload)

100 90 80 70 60 50 40 30 20 10 0

Number of flits (%)

100 90 80 70 60 50 40 30 20 10 0

Number of flits (%)

Number of flits (%)

Fig. 6. Average flit jitter

IABP SIABP

IAT 1.2

9.5

IAT

75.7 605.4 4843 Thresholds (millisec)

IAT 38748

(b) 55 Mbps connections (81% workload)

100 90 80 70 60 50 40 30 20 10 0

IAT

IABP SIABP

1.2

9.5

75.7 605.4 4843 Thresholds (millisec)

38748

(c) 55 Mbps connections (87.5% workload)

Fig. 7. Distribution of flit delay since generation for 0.064 and 55 Mbps connections

be injected. A frame is composed of a number of flits. The number of flits that compose every frame has been extracted from real MPEG-2 video traces. Some data about their frame sizes are shown in Table 1. Two ways of injecting these flits into the NIC buffers have been considered: Back-to-Back (BB) model. In this model, all the flits are transmitted at a peak bandwidth, common to all the connections. The peak bandwidth is such that it allows the injection of the largest frame among all the connections within 33 millisecs. Transmission of each frame starts at a frame time boundary. All the flits that compose the frame are injected at the selected peak rate, and then, the source becomes idle until the next frame time boundary. The peak bandwidth in the experiments is 50 Mbps for all the connections.

366

M.B. Caminero et al. Table 1. MPEG-2 video sequence statistics: Image sizes in bits Video Sequences

Ayersroc

Hook

Martin

Flower

Mobile

Table

Garden

Calendar

Tennis

Football

Max.

535030

454560

444588

900139

970205

933043

590532

Min.

148755

159622

116094

308411

412845

260002

340246

Average

232976

272738

199880

497126

600742

440547

441459

Figure 8-a depicts this model. IATp stands for the Inter-Arrival Time (IAT) related to the peak bandwidth. Smooth-Rate (SR) model. In this model, the flits that compose a frame are transmitted with a different IAT for every frame, in such a way that the flits of a frame are evenly distributed within the frame time. The IAT has been computed as the ratio between 33 msecs and the number of flits that compose the frame. A graphical representation is shown in Figure 8-b.

Fig. 8. VBR injection models

Simulations have been run until four complete GOPs (Group Of Pictures) from every connection have been forwarded through the router. The connections sharing the same physical link have been randomly aligned, that is, they start at a random time within a GOP time. In order to assess performance, and as the considered application data unit is the video frame, the presented results are related to the delay and jitter experienced by the frames. Figure 9 shows the average frame delay since generation. It can be noticed that before saturation, both approaches behave quite similarly, and when workload is near saturation (around 80 %), SIABP performs slightly better than IABP. This holds for both flit injection models. Regarding frame jitter, SIABP achieves clearly better results than IABP for the SR injection model, specially with workload levels greater than 70%, while with BB model SIABP performs slightly worse. Anyway, average jitters are always under 4 microsecs, which is a quite bearable value. Note that even jitter values of several millisecs can be absorbed at the destination by using jitter absorption techniques [12]. Lastly, the distribution of frame delays since generation has been computed. The deadlines considered are multiples and submultiples of a frame time (F T , 33 milliseconds), ranging from F T /16 (2.06 millisecs) to 8192 × F T (270 seconds).

100000

IABP SIABP

Average FRAME delay (microsec)

Average FRAME delay (microsec)

Link Scheduling in the Multimedia Router (MMR)

10000 1000 100 10

50

55

60

65

70

75

80

85

90

100000

367

IABP SIABP

10000 1000 100 10

95

50

55

Generated load (%)

60

65

70

75

80

85

90

95

Generated load (%)

(a) SR injection model

(b) BB injection model

9

IABP SIABP

8

Average frame jitter (microsecs)

Average frame jitter (microsecs)

Fig. 9. Average frame delay since generation

7 6 5 4 3 2 1 50

55

60

65 70 75 80 Generated load (%)

85

90

95

9

IABP SIABP

8 7 6 5 4 3 2 1 50

55

60

65 70 75 80 Generated load (%)

85

90

95

Fig. 10. Average frame jitter

Results are plotted in Figure 11 for both injection models. Only results for the workload levels right before and right after saturation are shown. With the SR injection model, all the frames experience delays lower than 66 millisecs for both algorithms, with a workload of 81%. Tighter thresholds can be met for more flits when using the SIABP algorithm. Even when workload has entered saturation (workload = 87%), both algorithms make frame delays fit into deadlines of around 500 milliseconds. Again, if SIABP is used, more frames are able to fit into lower delay bounds. On the other hand, with the BB injection model, results are quite similar for both algorithms. Deadlines of 132 millisecs right before saturation, and around 500 millisecs right after saturation can be met both with IABP and SIABP. These are quite reasonable values, since a typical deadline for MPEG-2 video transmission is one second between endpoints. This is the value for the CTD (Cell Transfer Delay) recommended by the ATM Forum for video distribution services, using MPEG-2 [13]. The reason for this behavior is that the flits injected by SR sources usually have to spend less time in buffers, because they are injected at a lower rate than the ones from BB sources. Within that period of time, their priority increases quicklier. Note that as queue delay continues increasing, priority is doubled less frequently. On the other hand, BB sources inject their flits as bursts with a fixed peak rate. So, their flits have usually to wait longer, and their priority values get to increase slower and slower, in a more similar way to what IABP does. This effect is most noticeable for workloads over 70%.

100 90 80 70 60 50 40 30 20 10 0

IABP SIABP

Number of frames (%)

M.B. Caminero et al.

Number of frames (%)

368

1s 4.12

33

264

2212

100 90 80 70 60 50 40 30 20 10 0

16896 135268

IABP SIABP 1s 4.12

33

Thresholds (millisec)

264

2212

16896 135268

Thresholds (millisec)

100 90 80 70 60 50 40 30 20 10 0

IABP SIABP 1s 4.12

33

264

2212

Thresholds (millisec)

16896 135268

Number of frames (%)

Number of frames (%)

(a) SR model, workload = 81 % (b) SR model, workload = 87 % 100 90 80 70 60 50 40 30 20 10 0

IABP SIABP 1s 4.12

33

264

2212

16896 135268

Thresholds (millisec)

(c) BB model, workload = 81 % (d) BB model, workload = 87 % Fig. 11. Distribution of frame delay since generation for the SR injection model

6

Conclusions

The Multimedia Router is aimed at providing QoS guarantees to different classes of traffic in a LAN environment, while remaining compact and fast. One of the key elements to achieve these goals is the link/switch scheduling algorithm. In this algorithm, priorities have to be computed for the head flit in every virtual channel. Thus, as many priority computing engines as virtual channels are needed in the MMR router. In this paper, a novel priority biasing algorithm has been presented. This algorithm, called SIABP (Simple-IABP), considerably simplifies the hardware implementation of the mechanism used to compute priorities with respect to the previous proposal. Results obtained with the Synopsys design tool show that silicon area is reduced 22 times, and the estimated delay is 38 times lower. Simulations where carried out with both CBR and VBR traffic, and show that performance does not suffer with this hardware simplification. What is more, overall performance is enhanced with the new algorithm.

References 1. A. Chien, J.H. Kim, “Approaches to Quality of Service in High Performance Networks,” Proceedings of the Workshop on Parallel Computer Routing and Communication, Lecture Notes in Computer Science, Springer-Verlag, pp.1-19, June 1997. 2. B. Caminero, C. Carri´ on, F. J. Quiles, J.Duato, and S. Yalamanchili, “Tuning buffer size in the Multimedia Router (MMR),” To appear in Proceedings of the Workshop on Communication Architecture for Clusters, held in conjunction with the 2001 International Parallel and Distributed Processing Symposium (IPDPS’2000), April 2001.

Link Scheduling in the Multimedia Router (MMR)

369

3. J. Duato, S. Yalamanchili, M.B. Caminero, D. Love, and F.J. Quiles, “MMR: A high-performance multimedia router. Architecture and design trade-offs,” Proceedings of the 5th Symposium on High Performance Computer Architecture (HPCA-5), pp. 300-309, January 1999. 4. D. Garcia, D. Watson, “ServerNet II,” Proceedings of the Workshop on Parallel Computer Routing and Communication, pp. 119-136, June 1996. 5. P. T. Gaughan and S. Yalamanchili, “Adaptive routing protocols for hypercube interconnection networks,” IEEE Computer, vol. 26, no. 5, pp. 12–23, May 1993. 6. P. T. Gaughan and S. Yalamanchili, “A family of fault-tolerant routing protocols for direct multiprocessor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 6, no. 5, pp. 482–497, May 1995. 7. D. Pendery, J. Eunice, “InfiniBand Architecture: Bridge Over Troubled Waters,” Research Note, available from the web page: http://www.infinibandta.org 8. M. J. Karol, M. G. Hluchyj and S. P. Morgan, “ Input versus output queuing on a space division packet switch,” IEEE Transactions on Communications, December, 1987. 9. M. G. H. Katevenis, et al., “ATLAS I: A single-chip ATM switch for NOWs,” Proceedings of the Workshop on Communications and Architectural Support for Network-based Parallel Computing, February 1997. 10. J.H. Kim, “Bandwidth and latency guarantees in low-cost, high-performance networks,” Ph. D. Thesis, Department of Computer Sciences, University of Illinois at Urbana-Champaign, 1997. 11. D. Love, S. Yalamanchili, J. Duato, M.B. Caminero, and F.J. Quiles, “Switch Scheduling in the Multimedia Router (MMR),” Proceedings of the 2000 International Parallel and Distributed Processing Symposium (IPDPS’2000), May 2000. 12. M. Perkins and P. Skelly, “A hardware MPEG clock recovery experiment for variable bit rate video transmission,” ATM Forum, ATM94-0434, May 1994. 13. M Schwartz and D. Beaumont, “Quality of service requirements for audio-visual multimedia services,” ATM Forum, ATM94-0640, July, 1994. 14. “Generic coding of moving pictures and associated audio,” Recommendation H.262, Draft International Standard ISO/IEC 13818-2, March, 1994. 15. “Synopsys DesignWare Guide,” version 1998.02. 16. “Synopsys Reference Manual,” version 1998.02. 17. “IEEE Standard VHDL; Language Reference Manual,” IEEE STD1076, 1993.

The Folded Hypercube ATM Switches Jahng S. Park1 and Nathaniel J. Davis IV2 The Bradley Department of Electrical and Computer Engineering Virginia Polytechnic Institute and State University Blacksburg, VA 24061 1 [email protected], (540) 231-2295, fax: (540) 231-3362 2 [email protected], (540) 231-4821, fax: (540) 231-3362 Abstract. With the increasing demand and growth of high-speed networks, it is imperative to develop high performance network switches that also have low complexity. Over the years, many high performance ATM switches have been proposed. The majority of these switches has high performances but also have very high hardware complexities. Therefore, there is a need for switch designs with lower complexity and high performance. The authors are proposing the use of the folded hypercube (FHC) as a new infrastructure for ATM switches. This paper presents two novel ATM switches that are implemented from the FHC networks. It presents the design of the two switches, discusses how the simulation models are developed, and gives the analysis of the simulation results. Finally, the performances of the two switch models are compared to other switches in the literature.

Introduction For broadband access to the Integrated Services Digital Network (ISDN), CCITT has chosen Asynchronous Transfer Mode (ATM) as the switching and multiplexing technique. ATM is being widely accepted by common carriers as the mode of operation for future communication systems, transporting and switching various types of traffic (voice, audio, video, and data). The ATM switches for Broadband ISDN (BISDN) differs from the existing ATM LAN switches in terms of network capacity, throughput, and delay performance. Many high performance ATM switches have been proposed in the literature, and comprehensive surveys on ATM switches can be found in [1, 2]. The authors have designed new ATM switches based on the folded hypercube (FHC). This paper presents how the two switches are designed using the FCH as their fabrics, discusses their performances.

Hypercube and Folded Hypercube Networks For the high-speed cell switching requirement of ATM networks, 150Mbps or higher, interconnection networks would represent the best solution to implement the I/O interconnection device of an ATM switching fabric. This can be attributed to their P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 370–379, 2001 © Springer-Verlag Berlin Heidelberg 2001

The Folded Hypercube ATM Switches

371

fast, self-routing packet property as shown by [3]. Furthermore, the parallel processing capability of these networks that exploits their self-routing property makes supporting the load values envisioned for an ATM switch feasible. Most of the interconnection network-based ATM switches in the literature are based on different types of multistage interconnection networks [1, 2]. 010

110 111

011 000

100

101

001

Fig. 1. A 3-dimension Hypercube Network.

However, a few researchers have studied ATM switches based on the hypercube [4, 5]. The hypercube (Fig. 1), also known as the Cube [6], is a single-stage network that offers a rich, low-complexity interconnection structure with large bandwidth, logarithmic diameter, high degree of fault tolerance, and inherent self-routing n capability. An n-dimension hypercube has N=2 nodes. The two hypercube-based ATM switches proposed by [4] and [5] were shown to have performances comparable with other ATM switches in the literature, but lower hardware complexity. They also provided a different direction in the design of the interconnection network based ATM switches. [2] (010) [1]

(000)

[0] [3]

[2]

(011)

(110)

[0]

[1]

[1]

[1]

[3] [0]

(111)

[3]

(001) [2]

[3]

Complementary Links [k] Link Dimension

(100)

[0]

(101)

(xyz)

[2]

Node Numbers in Binary

Fig. 2. The Structure of an FHC(3) [ElL91].

In order to further improve the characteristics and performance of the hypercube networks, some variations of the hypercube structure have been reported in the literature. These variations further reduce the diameter and traffic congestion of the hypercube with little or no hardware overhead. One of these variations is the folded hypercube (FHC) proposed by El-Amawy and Latifi [7, 8]. A folded hypercube of dimension n, FHC(n), can be constructed from a standard n-dimension hypercube by connecting each node to the unique node that is farthest from it (Fig. 2). This extra links are the complementary links. The hardware overhead is almost 1/n, which is negligible for large n. The FHC is shown to have a self-routing capability, and this is an important feature that avoids unnecessary communication delays and message

372

J.S. Park and N.J. Davis IV

congestion. [7, 8] gave a routing algorithm that performs the routing between any pair of nodes. The analytical study by [7, 8] showed that the FHC has better performance measures in addition to the smaller diameter when compared to the hypercube. The average distance1 in the FHC is at least 15% less than that of the same size hypercube. The cost factor2 for the FHC is also appreciably less than that of the n-cube and tends to half for large n. Finally, the FHC saturates at a higher loading value compared to the hypercube. A detailed presentation of the analytical result can be found in [6, 7]. To exploit the performance advantages of the FHC, we are using the FHC as a new infrastructure for two ATM switches. Before the FHC is modified into the new ATM switches, a simulation model of the FHC is developed and studied. The validity of the model is verified by comparing the simulation results with the analytical results of El-Amawy and Latifi [9]. Based on this validated model of the FHC, two new ATM switches are developed.

010

011

110

111

000

001

100

101

External Input & Output-Lines

Fig. 3. An (8×8) FAS-1.

New FHC ATM Switches The two new ATM switches are developed using the folded hypercubes (FHC) [ElL91, LaE89] as their switching fabrics. A brief description of the architectures of the switches is given here. The first proposed architecture is called FAS-1 (FHC n ATM Switch-1), and it uses a FHC(n) to implement an N×N switch where N = 2 (Fig. 3). Our second proposed architecture, called FAS-2 (FHC ATM Switch-2), uses a n FHC(n+1) to implement an N×N switch where N = 2 (Fig. 4). The nodes with addresses from 0 to N–1 are called input-nodes, and the nodes with addresses from N to 2N–1 are called output-nodes. The set of input-nodes (output-nodes) is called input-cube (output-cube). Fig. 5 shows the internal structure of a FAS-1 node. All the nodes of FAS-1 and the input-nodes of FAS-2 have store-and-forward (SAF) buffers that temporarily store the cells from the links and the external line while they wait to be routed. Finally, all the nodes of FAS-1 and the output-nodes of FAS-2 1

2

The average distance is the summation of distances of all nodes from a given source node over the total number of nodes. The cost factor can be defined as the product of the diameter and degree of the node (i.e., the number of links per node) for a symmetric network.

The Folded Hypercube ATM Switches

373

have the output buffers. The output buffer is needed since more than one cell can arrive at the same time. Also, re-sequencing of the cells is performed while the cells are queued in the output buffers. External Input-Lines

010

011

110

111

000

001

100

101

External Output-Lines

Fig. 4. A (4×4) FAS-2.

To minimize the buffers needed in the network, the two new switches use deflection routing. [10, 11] have shown that the deflection routing performs well in hypercube networks of different sizes for the whole range of light to heavy loading. In deflection routing, congestion causes packets in the network to be temporarily misrouted rather than buffered or dropped. This allows good performance with smaller number of buffers compared to the non-deflection routing. It has performed well when [4, 5] have used it in their switches.

0 1

SAF

: Buffers n 1 : (n+2) c

external input

Input Buffers (Bi)

Router

Buffer Controller

: :

0 1 n 1 c Output Buffers (Bo)

external output

Fig. 5. Structure of a node in FAS-1.

The two new switches use a three-level priority scheme in their routing algorithm. The highest priority level is the class-priority. An ATM network has two general classes of traffic, time-sensitive and time-insensitive. A time-sensitive cell will have a higher priority than a time-insensitive cell during the link selection process. This is to guarantee the Quality of Service (QoS) of the time sensitive ATM traffic. The next priority level is the age-priority. The oldest cell among all the cells requesting a particular link wins during the link selection process. Giving a higher priority to the older cell preserves the cell sequence as much as possible since keeping the cell sequence is as important as providing high throughput, low loss switching in ATM environment. Furthermore, the destination node will also use this cell numbers to reorder the cells. The lowest priority used is called dist-priority. The cell closer to its

374

J.S. Park and N.J. Davis IV

destination will have a higher priority because a cell closest to its destination has the fewest possible candidate links and is most likely to encounter link contention. With deflection routing, no cells are dropped while they are routed. A cell is dropped when the external input-line buffer overflows or when a cell reaches its destination and it is older than the last cell transmitted to the external output-line. These two methods, deflection routing and priority scheme, keep the cell loss rate to a minimum. When a cell enters the switch, information, such as the class field, cell number (CN), the distance-to-destination (DD), and the destination address, is tagged in the header of the cell. This information is used by each node to route and resequence the cells. The routing algorithm of [7, 8] has been extensively modified for the two proposed switches. The new algorithm, Distributed Dynamic Routing Algorithm, is now dynamic and can be performed at each node. When a node receives cells at the beginning of a cell cycle, the node first sorts the cells based on the priority scheme, and routes them by using the routing algorithm. If the cells have reached the destination, the cells with the higher class-priority are allowed to enter the output buffer first. During the routing process, link cells are considered before the line cells for the following reasons. It is impossible to guarantee an output link for every cell in a node of FAS-1 and input nodes of FAS-2 since up to m+1 cells may arrive at a time when there are only m links to choose from in these nodes. However, since the number of input and output inter-node links is equal, we can guarantee at least one output link for each link cell if the link cells are routed before the line cells. A new line cell is dropped if the input buffer is full, so the switches should have enough input buffers for input cells that experienced link blocking for all the preferred and detour links. Different input buffer sizes were studied to find a buffer size that gives the best cost and cell loss trade off. Under a normal traffic and unsaturated load level, however, the probability that at least one cell has reached its destination is high. Therefore, a link can be guaranteed for a line cell as well. Each node of FAS-1 and each output node of FAS-2 will have an output buffer controller (OBC) that manages the cells queued in the output buffer. The OBC maintains N virtual queues for cells from each of N external input ports. Each cell is placed in the corresponding virtual queue by checking the external input port address of the cell’s header. We chose a shared buffering strategy over a non-shared strategy since the shared buffering strategy was shown to require fewer total number of buffers than physically separated (partitioned) buffers [12, 13, 14]. One of the two functions of the OBC is monitoring whether the buffers are shared in a fair manner. This function is needed without a good, fair buffer controller, the shared buffers may perform worse than the non-shared buffers [14]. The second task of the OBC is resequencing the cells that originated from the same external input port before they are transmitted through the external output line. The OBC does this by using the cell numbers mentioned above. The two switches are modeled and simulated with OPNET Modeler3 to study their performances.

3

An object-oriented communications network modeler and simulator developed by OPNET Technologies.

The Folded Hypercube ATM Switches

375

Simulation Results In simulating the two switches’ message traffic, the uniform distribution is used to generate destination addresses to study the network performance under different conditions. If the distribution of destination addresses is not uniform, some parts of the network will be more congested than others, contributing to a decrease in throughput. Also, the packets are generated by N independent random processes, one for each of N nodes. These assumptions lead to an analysis of the maximum performance that a network can support [15]. In addition to the uniform distribution, the normal distribution is used to generate the destination addresses. Even though the uniform destination address distribution gives the maximum throughput of a network, it is common in real world applications where one or few destinations may be more favored by the sources. To analyze the network performance in a more practical situation, the normal distribution is also used to generate destination addresses or hot-spots. Hot-spots cause a disproportionate number of packets to be routed to a subset of the destinations [16, 17]. This is done by generating packets over a range of destination addresses with a preferential concentration around a mean destination address. For the simulations with hot-spots, packet destinations are chosen using a normal distribution with a specified mean and standard deviation. The mean is chosen randomly, but the value chosen for the standard deviation is one-quarter of the network size, based on the study by [18].

FAS-1 & FAS-2

ETE Delay (unit time)

9.5

FAS-1/Class0 FAS-1/Class1 FAS-2/Class0 FAS-2/Class1

9 8.5 8 7.5 7 6.5 6 0.1

0.2

0.33

0.5

0.67

Load

0.8

0.9

0.95

Fig. 6. Average end-to-end Delay for FAS-1 & FAS-2 (32×32, uniform dist.)

The simulations were run until about 10 million cells are submitted into the switch. Among these cells, 30% of them were randomly selected to be Class 1 (timesensitive) cells and the rest were Class 0 (time-insensitive) cells. The simulation study was done under different traffic patterns (uniform and normal distributions), switch sizes (8×8 to 1024×1024), and loads (10% to 100%)4. The simulation results 4

Cells are generated at a maximum rate of one cell per simulation time unit.

376

J.S. Park and N.J. Davis IV

show that both FAS-1 and FAS-2 have low cell loss rate and low average end-to-end delay while having low hardware complexity. Two sample cases of the simulation results are given here.

FAS-1

Cell Loss Rate

6.00E-04 5.00E-04

FAS-1/Class0

4.00E-04

FAS-1/Class1

3.00E-04

FAS-1/Total

2.00E-04 1.00E-04 0.00E+00 0.1

0.2

0.33

0.5

0.67

0.8

0.9

0.95

Load Fig. 7. Cell loss rate for FAS-1 (32×32, uniform dist.)

FAS-2

Cell Loss Rate

2.50E-05

FAS-2/Class0

2.00E-05

FAS-2/Class1

1.50E-05

FAS-2/Total

1.00E-05 5.00E-06 0.00E+00 0.1

0.2

0.33

0.5

0.67

0.8

0.9

0.95

Load Fig. 8. Cell loss rate for FAS-2 (32×32, uniform dist.)

Fig. 6 shows the average end-to-end cell delay for 32×32 FAS-1 and FAS-2. The Class 1 cells of FAS-1 and FAS-2 experienced much lower end-to-end delay through the switches than the Class 0 cells because of the time-priority implementation. Also, because of the time-priority, the cell loss rate for the Class 1 cells was much lower than that of the Class 0 cells for both FAS-1 and FAS-2 (Fig. 7 and 8). The time priority scheme of FAS-1 and FAS-2 was able to route the Class 1 cells faster even when the switches were under high loads. Similar results were obtained for different switch sizes and for normal distribution. As can be seen in Fig. 9 and 10, FAS-1 and FAS-2 maintained low cell loss rates for the high priority Class 1 cells at high loads by sacrificing the cell loss rates for the Class 0 cells. At 95% load with normal -4 distribution, 32×32 FAS-1 achieved a cell loss rate of 5.5×10 for the Class 1 cells, -5 and 32×32 FAS-2 achieved a cell loss rate of 2.1×10 . The switch designed by [4] uses an n-dimensional hypercube to implement an N×N n switch (N = 2 ). [4] gave simulation results for a 128×128 switch (7-dimensional

The Folded Hypercube ATM Switches

377

hypercube, a total of 128 nodes) with five different routing algorithms. The performance comparison between FAS-1/FAS-2 and [4] is summarized in Table 1. With the same number of nodes and a slight increase in the number of links (1/n), FAS-1 gave slightly higher total cell loss rate. However, FAS-1 gave higher priority to time-sensitive cells, and the Class 1 cells experienced a much lower cell loss rate than the cells of [4]. FAS-2 used twice the number of nodes, but its cell loss rate was much lower than the switch of [4] and even FAS-1.

FAS-1

Cell Loss Rate

3.00E-02

FAS-1/Class0 FAS-1/Class1 FAS-1/Total

2.50E-02 2.00E-02 1.50E-02 1.00E-02 5.00E-03 0.00E+00 0.1

0.2

0.33

0.5

0.67

0.8

0.9

0.95

Load Fig. 9. Cell loss rate for FAS-1 (32×32, normal dist.)

FAS-2

Cell Loss Rate

2.50E-03 2.00E-03

FAS-2/Class0

1.50E-03

FAS-2/Class1 FAS-2/Total

1.00E-03 5.00E-04 0.00E+00 0.1

0.2

0.33

0.5

0.67

0.8

0.9

0.95

Load Fig. 10. Cell loss rate for FAS-2 (32×32, normal dist.)

The switch designed by [5] uses an n+1-dimensional hypercube to implement an n N×N switch (N = 2 ). [5] gave simulation results for a 32×32 switch (5-dimensional hypercube, a total of 64 nodes). The performance comparison between FAS-1/FAS-2 and [5] is summarized in Table 2. FAS-1 may have a slightly higher cell loss rate than the switch by [5], but needs smaller number of total nodes (32 nodes) and smaller sized output buffers. Also, FAS-1 is able to keep the cell loss rate and the average cell delay of the time sensitive cells (Class 1) very low. FAS-2 also had a total of 64 nodes, but gave much lower cell loss rate with smaller sized output buffers. The cells of the switch by [5] experienced delay of about 25 time units as they traversed through the switch from input to output under uniform traffic pattern

378

J.S. Park and N.J. Davis IV

and 0.95 loading. However, the cells of the FAS-1 experienced average delay of about 8.5 time units--the Class 1 cells experienced only about 6.5 time units. The cells of FAS-2 experienced lower end-to-end delay. The total cell loss rate of FAS-2 was lower than that of [5], and the cell loss rates of the time-sensitive Class 1 cells was lower by an factor of 100. Table 1. Performance Comparison of FAS-1 and FAS2 with [4] (128×128 switch under uniform traffic and 0.9 loading) [4] -5 Cell Loss Rate 1.5×10

Total -5 4.1×10

FAS-1 Class 0 -5 5.5×10

Class 1 -6 8.3×10

Total -6 4.7×10

FAS-2 Class 0 -6 4.5×10

Class 1 -7 5.2×10

Table 2. Performance Comparison of FAS-1 and FAS2 with [5] (32×32 switch under uniform traffic and 0.95 loading) [5] Total -4 -4 Cell Loss Rate 2.0×10 4.0×10 Ave. Cell Delay 25 8.47 Input Buffer Size 8 2 Output Buffer Size 40 38

FAS-1 Class 0 -4 5.5×10 9.33

Class 1 -5 5.9×10 6.47

Total -5 1.5×10 7.72 1 35

FAS-2 Class 0 -5 2.1×10 8.85

Class 1 -6 2.0×10 6.86

Conclusion Based on the folded hypercube network (a variation of the hypercube network), two new ATM switches FAS-1 and FAS-2 were proposed in this paper. Simulation study of the two switches showed them to have very good performances in terms of end-toend cell delay and cell loss rate. The performances of the two switches were compared to two hypercube switches in the literature. FAS-1 and FAS-2 outperformed the switches by [4, 5] with only slight increase in hardware cost. While the switches by [4, 5] did not implement any time-priority, FAS-1 and FAS-2 were implemented with two-level time-priority giving higher priority to the time-sensitive cells. The benefit of this priority scheme was shown in the simulation results. The cells loss rate and the average cell delay of the time-sensitive cells were much lower than those of the time-insensitive cells. Even when the loading neared 100%, both FAS-1 and FAS-2 still managed to achieve very good cell loss rate for the timesensitive cells. Also, the time-sensitive cells experienced low end-to-end delay even when the switches were heavily loaded. These results indicated that FAS-1 and FAS2 are good candidates as new ATM switches for the fast growing high-speed networks.

The Folded Hypercube ATM Switches

379

References 1. H. Ahmadi and W. E. Denzel, “A Survey of modern high-performance switching techniques,” IEEE Journal on Selected Areas in Communications, vol. 7, no. 7, pp. 10911103, Sep. 1989. 2. R. Y. Awdeh and H. T. Mouftah, “Survey of ATM switch architectures,” Computer Networks and ISDN Systems, vol. 27, no. 12, pp. 1567-1613, Nov. 1995. 3. J. H. Patel, “Performance of processor-memory interconnection network,” IEEE Transactions on Computers, vol. 30, no. 10, pp. 771-780, Oct. 1981. 4. T. Matsunaga, “Sorting-based routing algorithms of a photonic ATM cell switch: HiPower,” IEEE Transactions on Communications, vol. 41, no. 9, pp. 1356-1363, Sep. 1993. 5. D. C. W. Pao and W. N. Chau, “Design of ATM switch using hypercube with distributed shared input buffers and dedicated output buffer,” International Conference on Network Protocols, pp. 92-99, 1995. 6. H. J. Siegel, “Analysis Techniques for SIMD Machine Interconnection Networks and the Effects of Processor Address Masks, ” IEEE Transactions on Computers, vol. C-26, pp. 153-161, Feb. 1977. 7. A. El-Amawy and S. Latifi, “Properties of folded hypercubes,” IEEE Transactions on Parallel and Distributed Systems, vol. 2, no. 1, pp. 31-42, Jan. 1991. 8. S. Latifi and A. El-Amawy, “On folded hypercubes,” International Conference on Parellel Processing, vol. 1, pp. 180-187, 1989. 9. J. S. Park and N. J. Davis IV, "Modeling the Folded Hypercube Network with OPNET," The Proceedings of OPNETWORK '99, Washington, DC, August 1999. 10. A. G. Greenberg and B. Hajek, “Deflection routing in hypercube networks,” IEEE Transactions on Communications, vol. 40, no. 6, pp. 1070-1081, Jun. 1982. 11. E. A. Varvarigos and D. P. Bertsekas, “Performance of hypercube routing schemes with or without buffering,” IEEE/ACM Transactions on Networking, vol. 2, no. 3, pp. 299-311, Jun. 94. 12. F. B. Chedid and R. B. Chedid, “A new variation on hypercubes with smaller diameter,” Information Processing Letters, vol. 46, no. 6, pp. 275-280, Jul. 26 1993. 13. B. R. Collier and H. S. Kim, “Efficient analysis of shared buffer management strategies in ATM networks under non-uniform bursty traffic,” IEEE INFOCOM’96, pp. 671-678, 1996. 14. S. C. Liew, “Performance of various input-buffered and output-buffered ATM switch design principles under bursty traffic: simulation study,” IEEE Transactions on Communications, vol. 42, no. 2/3/4, pp. 1371-1379, 1994. 15. D. M. Dias and J. R. Jump, “Packet switching interconnection networks for modular systems,” IEEE Computer, vol. 14, pp. 43-53, Dec. 1981. 16. A. L. DeCegama, The Technology of Parallel Processing, Volume 1, Prentice Hall, Englewood Cliffs, NJ, 1989. 17. G. F. Pfister and V. A. Norton, “Hot spot contention and combining in multistage interconnection networks,” IEEE International Conference on Parallel Processing, pp. 790-797, 1985. 18. J. S. Park, Performance analysis of partitioned multistage cube network and adaptive routed single-stage cube network, Master’s Thesis, Virginia Polytechnic Institute and State University, 1994.

Open Software Architecture for Multiservice Switching System Ho-Jin Park, Young-Il Choi, Byung-Sun Lee, Kyung-Pyo Jun Network Technology Lab., Electronics & Telecommunication Research Institute(ETRI) 161 Kajong-Dong, Yusong-Gu, Taejon, 305-600, Korea {hjpark, yichoi, bslee, kpjun}@etri.re.kr

Abstract. To meet the rigorous demands of today’s fast-moving telecommunication environment, every carriers want to deploy new services smoothly with minimal impact on the underlying infrastructure. Also it is necessary to create an open environment that enables the deployment of multivendor switching systems with optimum functionality and performance. The MSF(Multiservice Switching Forum) is an industrial forum to develop the network infrastructure that meets the above requirements. The MSF has been focusing on reaching and promoting consensus on the implementation of MSS(Multiservice Switching System) that realizes the vision of multiservice switching and defines a set of open intra-switching system interfaces. In this paper, we review the system architecture and characteristics of the MSS based on MSF architecture. We propose the open software architecture for the implementation of the MSS, the control scenarios for ATM SVC(Switched virtual Connection) service and management functions in the software architecture. The environment for software development is also considered.

1 Introduction Because of rapid changes in customer’s service requirement, telecommunication market environment and technology, every carriers are concerned about the network infrastructure that reduces risk by enabling the smooth deployment of new services with minimal impact on the underlying infrastructure. Since it can be risky to lock into a single vendor, proprietary solution for network infrastructure, it is necessary to create an open environment, where carriers and network operators can select the best of breed for each type of telecom equipment. This network infrastructure is totally different from the traditional one and requires flexible multiservice switching technology with open interfaces. At present, there are some organizations making the consensus on multiservice switching technology with open interfaces: such as MSF(Multiservice Switching Forum)[1][2], IEEE PIN(Programmable Interface for Network)[3], ISC(International Softswitch Consortium)[4], etc. The MSF has been founded in December 1998 for reaching and promoting consensus on implementation of MSS(Multiservice Switching System)[5][6] that realizes the vision of multiservice switching and defines a set of open intra-switching system interfaces. The goal of MSF is to develop an open switching system platform with both IP and ATM based services P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 380–389, 2001 © Springer-Verlag Berlin Heidelberg 2001

Open Software Architecture for Multiservice Switching System

381

In this paper, we review the system architecture and characteristics of MSS based on MSF architecture. The open software architecture for the implementation of MSS is proposed. We discuss the control scenarios for ATM SVC(Switched virtual Connection) service and management functions in the software architecture. The environment for software development is considered. Finally, we conclude our work.

2 MSS(Multiservice Switching System) MSS is a distributed switching (based on frame, cell or packet) system designed to support voice, video, and data such as ATM, Frame Relay, and Internet Protocol services.

Control Plane

Standard IN/Signaling APIs, Interfaces, and Protocols

IP/MPLS Controller

Switching Plane

Adaptation TCP/IP Plane External Interfaces/ Protocols

Voice/SS7 Controller

ATM/SVC Controller

...

Multiservice Switching Fabric (any switching principle )

Video

Voice

TDM

FR

ATM

...

Management Plane

Application Plane

Standard Physical and Logical Interfaces Fig. 1. MSS architecture

2.1 Multi-plane System Model A multi-plane system model has been selected as the basis of MSS architecture. An essential characteristic of the architecture is its flexibility in terms of the technology chosen to implement functionality of each plane. New technologies are allowed to evolve independently from each other in all three planes. As shown in the Fig. 1, MSS architecture is composed of 5 planes. The adaptation plane includes the physical interface to a user or another network element. The switching plane supports the actual switching fabric by which physical interfaces are connected. The control plane provides the generic capability to manage network service events and provides control over both the adaptation and switching planes.

382

H.-J. Park et al.

Standard protocols are used in communicating between the control plane and the switching/adaptation planes. The application plane provides services that use the capabilities of the control plane. It also provides enhanced services which control the services within the control plane. The management plane performs FCAPS(Fault, Configuration, Accounting, Performance, Security) functions against each plane. 2.2 Characteristics of MSS Architecture The main characteristics of MSS architecture are as follows: • MSS architecture realizes the vision of Multiservice switching by allowing logical partitioning of common resources between an ever-changing set of services. • It separates the control processing from the switching and adaptation aspects of a MSS to establish a framework which can be easily extended to support new Adaptation, Switching and Control Plane functions. Standard protocol is used at the interface between controller and switch, such as GSMP(General Switch Management Protocol)[7] or MEGACO(Media Gateway Control Protocol)[8], COPS-PR(Common Open Policy Service – Policy Provisioning)[9]. • It divides the monolithic switch into specialized components and defines open standardized interface between components, as shown in Fig. 2. These interfaces allow service providers to deploy MSSs composed of best-of-breed components from multiple vendors. Application Plane sg ix

Service Feature Gateway Function sa

Signaling Gateway st Function

Network Service Instance Control Function bc

mb Control Plane

ia

Network Edge Control Function

Bearer Control Function

ic

Management Plane vscm

Sub-ordinate Management Function

bs

bs Virtual Switch Control Function

Switching Plane

Adaptation Plane

np

sp

vsm

vsc Virtual Switch Function

Logical Port Function Partitioning Function

Fig. 2. Reference architecture of MSS

sm

Super-ordinate Management Function

Open Software Architecture for Multiservice Switching System

383

3. Open Software Architecture of MSS In this section, it is proposed the open software architecture for the implementation of MSS for ATM services. 3.1 Separation of Complexes For physical implementation, MSS is decomposed into three components: switching complex, processor complex and management complex, as shown in Fig. 3. The switching complex contains ports implementing adaptation plane functions connected via a switching fabric. The switching complex connects to a cluster of one or more controller processes in a processor complex. The processor complex includes computers running the controller software that implement functions in the control plane. The management complex covers functions for monitoring and control of the switching, adaptation and control planes. GSMPv3 protocol is used between the processor complex and the switching complex, SNMP(Simple Network Management Protocol) protocol between the management complex and the switching complex, the proprietary interface based on the middleware, CORBA(Common Object Request Broker Architecture) between the management complex and the processor complex. In the following subsections, the building blocks in each complex are defined and their roles and interactions are discussed.

Management Complex

Processor Complex BCF

NSICF UNI Control Process

Routing Control

NNI Control Process

UNI Protocol Control

Routing Protocol Control

NNI Protocol Control

VSCF PVC Control

Switch Control GSMP Master

Service FCAPS Agent

CORBA Interface

VS FCAPS Manager

SubMF

ATM/AAL/SAAL Physical Layer

SNMP

Physical Layer ATM/AAL/SAAL

SupMF

VSF Switch Fabric

Switch Complex

Switch Function

GSMP Slave

VS MIB Agent

Switch FCAPS Agent SNMP

Logical Port Function

LPF

PF

Switch Partitioning

Fig. 3. Complexes and building blocks for the implementation of MSS

Switch Partition Manager

384

H.-J. Park et al.

3.2 Processor Complex For the control of network service instances, two building blocks are defined: UNI Control and Routing Control. NNI Control and PVC Control are defined for the control of bearer connection between end points, Switch Control and GSMP Master for the control of virtual switch and logical ports, Service FCAPS Agent for the management of services in the processor complex. UNI(User Network Interface) Control contains the logic and information to establish, maintain, modify, and release a network service instance. It provides the information for billing and performance and statistics analysis. ATM Forum UNI protocol 3.1 and 4.0 are used at UNI interface. Routing Control determines the end point address and routing options for reaching the address. It identifies the control signaling, bearer signaling, address requirements of the associated network service instance. ATM Forum PNNI(Private Network Node Interface) routing protocol is used to manage and maintain routing information with peer entities. NNI(Network Node Interface) Control establishes, manages and maintains the state of the required switched bearer path(s) for a specific network service instance. It also manages and maintains the state of links under its control. PNNI signaling protocol is used to perform signaling to peer entities. PVC(Permanent Virtual Connection) Control establishes, manages and maintains the state of the required permanent virtual bearer path(s) for a specific network service instance. Switch Control controls and monitors the virtual switch and logical ports within a partition. It manages the cross-connection between the logical ports in the virtual switch. GSMP Master performs the master functions of GSMP protocol to control the switching complex. Service FCAPS Agent performs FCAPS functions against the services in the processor complex. The interaction with the management complex is done through CORBA for location and access transparency. 3.3 Switch Complex Cross-connect functionality between logical ports is realized by the following three building blocks. Logical Port Function provides media mapping and service specific adaptation functions related to the incoming media stream. Switching of media stream from one port to another is performed by Switch Function. GSMP Slave performs the slave functions of GSMP protocol to interact with the processor complex. For partitioning and management, two blocks are defined. Switch Partitioning creates a virtual switch by specifying the switch resources that are to make up the partition. Switch FCAPS Agent performs FCAPS functions against the physical switch hardware and interacts with the management complex. 3.4 Management Complex In the MSS architecture defining virtual switches, management functions are required on two levels: the first is the management of physical switch and switch partitioning, and the second is the management of individual virtual switches. The former is

Open Software Architecture for Multiservice Switching System

385

referred to as the Super-Ordinate Management Function(SupMF), whilst the latter as the Sub-Ordinate Management Function(SubMF). SupMF is composed of two building blocks: Switch Partition Manager, VS MIB Agent(Virtual Switch Management Information Base Agent). Switch Partition Manager controls the partition of virtual switch by creating, modifying, and deleting virtual switches. Four kinds of switch resources are partitioned into each virtual switch. The first is the bandwidth, buffer space, and queue schedulers per logical port assigned to a virtual switch. The second is the label space resources per logical ports (e.g., VPI/VCI for an ATM port, DLCI for a frame relay port, etc.). The third is the routing table space of the switch per virtual switch. The last is the bandwidth of communication link between the processor complex and the switch complex, and the processor cycles of controller in the processor complex. VS MIB Agent partitions and virtualizes the management information and functions presented to the SubMF corresponding to each virtual switch. It allows the manager to perform FCAPS functions against the switch complex by managing the physical hardware. SubMF is mapped into 5 building blocks as follows. VS Configuration Manager manages the configuration of logical ports in the virtual switch. The configuration information of logical ports is received from the switch complex at the initialization phase of controller in the processor complex with all port configuration message procedures of GSMP. VS Fault Manager performs supervision and test functions on logical ports. Changes in port state are reported by the switch complex with event message of GSMP. It performs management functions against logical ports with the help of Switch FACPS Manager in SupMF. VS Account Manager is responsible for billing to the call/connection services in the virtual switch. It gathers the billing information from UNI Control in the processor complex. VS Performance Manager measures and analyzes, monitors call traffics and the performance of connections and ports. Call traffic data is gathered from the building blocks in the processor complex, and performance data from the switch complex via Switch FACPS Manager in SupMF. VS Security Manager identifies and authenticates users. It controls resource access to make sure that users are authorized to perform the functions they request.

4 Control Scenarios for Service and Management In this section, the simplified control scenarios for ATM SVC service and management functions in the software architecture are considered. 4.1 ATM SVC Service In this scenario (see Fig. 4), it is assumed that a customer using ATM protocol accesses a network carrier’s ATM transport service to establish a SVC connection. 1. UNI Control creates an originating process to control the call when it receives SetUp message from the signalling channel of the ATM subscriber that is permanently connected to a controller in the processor complex via the switch complex at system initialization. 2. UNI Control process requests an available VPI/VCI label and bandwidth on the input port to Switch Control and receives the reply.

386

H.-J. Park et al.

3. If the reply is OK, UNI Control process requests number translation and routing for the call to Routing Control and receives the reply with the output port id. 4. UNI Control process sends SetUp_Internal message to NNI Control, which creates an outgoing process to control the call. 5. NNI Control process requests an available label and bandwidth on the output port to Switch Control and receives the reply. 6. NNI Control process notifies the self-process id. to UNI Control process, and send SetUp message to the peer switching system through the signalling channel. 7. When NNI Control process receives Connect message from the peer switching system, it relays the message to UNI Control process. 8. UNI Control process requests through-connection between the input port and the output port to Switch Control. 9. Switch Control requests through-connection via GSMP Master to the switch complex with AddBranch message of GSMP. 10.After the successful connection in the switch complex, UNI Control process sends Connect message to the originating ATM customer and terminates the call setup phase.

UNI Control

User

Routing Control

Switch Control

Switch Complex

NNI Control

Peer System

SetUp Port Resource Request Port Resource Response Routing Request Routing Response SetUp_Internal Port Resource Request Port Resource Response Egress Port Information Report SetUp Connect_Internal

Connect

Through_Connect Request Add Branch Request Add Branch Response Through_Connect Response Connect

Fig. 4. Control scenario to establish an ATM SVC connection

Open Software Architecture for Multiservice Switching System

387

4.2 Switch Partition At the initialization of system, switch partition procedure to create virtual switches is done as follows (see Fig. 5): 1. Switch Partition Manager gets the switch resource information from the switch complex by doing the SNMP “get” operation. The switch resource information includes the number of ports, the label type and range, the equivalent bandwidth, the performance parameters (e.g., packet loss ratio, maximum packet delay) for each port. 2. Switch Partition Manager creates virtual switches by partitioning the switch resources. It also configures the communication interface between the switch complex and controllers in the processor complex, such as controller id., control protocol (e.g., GSMP, MEGACO, COPS-PR), control interface (e.g., VPI/VCI for ATM interface, IP address and port number for Ethernet interface) for each controller. 3. Switch Partition Manager commits switch partitioning to the switch complex by doing the SNMP “set” operation on the variables in switch partition MIB. 4. Switch Partitioning in the switch complex setups switch partitioning and sends the virtual switch configuration information to each controller with GSMP. 5. With the virtual switch information, each controller controls calls and connections within the virtual switch. The virtual switch information is shared with SubMF to manage the virtual switch.

Switch Partition Manager

Switch Complex

VS Controller

SubMF

Switch Resource Information Request Switch Resource Information Response Create Virtual Switches Virtual Switch Config. Information Set Setup Switch Partition Virtual Switch Config. Information Report Setup Port Config. Info.

Share

Fig. 5. Control scenario for switch partitioning

388

H.-J. Park et al.

4.3 FCAPS Management The scenario to perform FCAPS management functions against switch hardware is done as follows (see Fig. 6): 1. The building block in SubMF requests management function for the virtual resources(e.g., logical port) to VS MIB Agent by doing the proper SNMP operation. 2. VS MIB Agent checks whether the SubMF are authorized to perform the functions against for the virtual resources. If not authorized, the refusal for the request is replied. Else, VS MIB Agent maps the virtual resource id. to the physical by referring the switch partition information and requests management function for the physical resources to the switch complex by doing the proper SNMP operation. 3. Switch FCAPS Agent in the switch complex performs management function and replies the result to VS MIB Agent. VS MIB Agent relays the response to the building block in SubMF. When VS MIB Agent receives the event on physical switch resources from the switch complex, it identifies the related controllers by referring the switch partition information and relays the event on virtual switch resources to the controllers. The procedures to perform management functions against controllers in the processor complex are done between the building blocks in SubMF and Service FCAPS Agent in the processor complex through CORBA.

Switch Complex

VS MIB Agent

VS Controller

SubMF

FCAPS Request [Virtual Resource Id.] Map Resource Id. FCAPS Request [Physical Resource Id.] FCAPS Response [Physical Resource Id.] Map Resource Id. FCAPS Response [Virtual Resource Id.] FCAPS Event Report [Physical Resource Id.] Get Related VS(s), Resource Id. FCAPS Event Report [Virtual Resource Id.] : FCAPS Request FCAPS Response (CORBA Interface)

Fig. 6. Control scenarios for FCAPS management

Open Software Architecture for Multiservice Switching System

389

5 Software Developing Environment The software structure is specified and designed by SDL(Specification and Description Language) that is a graphical language recommended by ITU-T. C codes are automatically generated from SDL code by CASE tool. We estimate that with SDL method the development cycle time is reduced by 50% comparing with the hand-written coding. The performance of the execution file is degraded by about 10%, which is considered not critical. In implementing the prototype of MSS, commercial workstation with Solaris OS is used for a control platform which accommodates the processor complex and the management complex. For the switch complex, it is used HANBit ACE 256 which is an ATM switching system developed in Korea.

6 Conclusion We review the system architecture and characteristics of MSS based on MSF architecture. The open software architecture for the implementation of the MSS is proposed and the control scenarios for ATM service and management functions in the software architecture are discussed. The environment for software design and the prototype implementation is also considered. In 2000, which is the first year of our project to develop network components for open multiservice networks, ETRI with 6 telecommunication equipment companies in Korea had developed the prototype of MSS for ATM services. In the following years, we are going to add MPLS(MultiProtocol Label Switching) functions to the prototype for Internet Protocol services. Media Gateways for VoATM(Voice over ATM) and VoIP(Voice over Internet Protocol) services with an open architecture will be also developed to interwork with the existing circuit switched networks.

References 1. N. Bjorkman et al., “The Movement from Monoliths to Component-Based Network Elements,” IEEE Communications Magazine, January 2001. 2. MSF(Multiservice Switching Forum): http://www.msforum.org 3. IEEE PIN(Programmable Interface): http://www.ieee-pin.org 4. ISC(International Softswitch Consortium): http://www.softswitch.org 5. MSF, “Multiservice Switching Forum System Architecture Implementation Agreement 1.0,” MSF-ARCH-001.00-FINAL IA, May 2000. 6. MSF, “White Paper: Physical Realization of the MSF Functional Architecture,” MSF 2000105, Jun. 2000. 7. IETF GSMP: http://www.ietf.org/html.charters/gsmp-charter.html 8. F. Cuervo et al., “Megaco Protocol Version 1.0,” IETF RFC 3015, November 2000. 9. K.H. Chan et al., “COPS Usage for Policy Provisioning (COPS-PR),” IFTF Internet Draft, October 2000.

A Multicast ATM Switch Based on PIPN1 Sema F. Oktug Department of Computer Engineering Electrical-Electronics Faculty Istanbul Technical University Maslak Istanbul 80626 Turkey [email protected]

Abstract. This paper presents a multicast ATM switch based on the Plane Interconnected Parallel Network (PIPN) which was proposed earlier. In order to convert the PIPN structure into a multicast ATM switch, input port buffers, internal input buffers, and resequencers are deployed. Moreover, to prevent packet loss in the internal stages, the backpressure mechanism is used. Copies of multicast packets are generated by using the recycling technique which employs multicast tree generation. The performance of the proposed multicast ATM switch is studied by simulations and the results are given in terms of throughput.

Introduction As B-ISDN and ATM find their places in our lives, it has been seen that multicast switches are inevitable parts of this technology. With the introduction of various applications, such as teleconferencing, distributed data processing, and video on demand, the percentage of multicast traffic in aggregate network load is increasing day by day. It is also clear that multicast switches are causing efficient use of network resources. As a result, new multicast ATM switches and multicast versions of the previously proposed ATM switches have been introduced [1]. In multicast ATM switches, one of the important issues is to generate multiple copies of a multicast cell. For this purpose, three techniques are used mainly: 1) Employing a dedicated copy network, 2) Generating copies while multicast cells are kept in input buffers, and 3) By using recycling based on the multicast tree approach. First two techniques generate all multicast cells at once or by using a cell splitting mechanism. In the multicast tree approach, multicast cells are generated according to a tree hierarchy arranged at call set up. In this manner, instant fluctuations of the internal switch traffic can be prevented. However, it may take longer for all the multicast cells to leave the switch. This paper introduces a new multicasting ATM switch based on the Plane Interconnected Parallel Network (PIPN) architecture. The PIPN which exploits the 1

This work is financially supported by Turkish Scientific and Technical Research Council under grant number EEEAG 197E027 and the Istanbul Technical University Research Fund under grand number 1076.

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 390–398, 2001 © Springer-Verlag Berlin Heidelberg 2001

A Multicast ATM Switch Based on PIPN

391

properties of banyan networks by alleviating the drawbacks of them was introduced in [2,3]. Its structure was mainly based on the idea of parallel interconnected routing planes. In the design of the PIPN, the main aim was to distribute the incoming heterogeneous traffic evenly throughout the interconnection structure in order to increase the performance under heterogeneous traffic. In this work, the PIPN structure is turned into a multicast ATM switch with the help of input port buffers, internal input buffers, and the backpressure mechanism. The recycling technique is used to generate multicast packets by using a multicast tree for each connection. It is observed that the number of recirculations is dropped significantly due to the outlet grouping property of the PIPN. However, due to the internal buffering and multiple paths between each input-output port pair, deployment of resequencers at the outlets of the switch have been inevitable in order to prevent out-of-order departures. This paper is organized as follows: Section 2 introduces the structure of the enhanced PIPN. Section 3 discusses the copy generation in multicasting and explains the recycling technique. The function of the input ports and the deciders in multicasting is explained here. The performance comparison of the multicast PIPN and a Banyan network based multistage load distributing multicast switch is given in Section 4. Finally, Section 5 concludes the paper.

Structure of the Multicast PIPN The PIPN is composed of three main units, namely the distributor, the router, and the output-port-dispatcher, as explained in [2]. The performance enhancement obtained after adding internal input buffers to the elements in the distributor and the router is presented in [3]. In this work, the structure of the PIPN is enhanced some more in order to support multicast traffic. There are three techniques used in the performance enhancement, namely input port buffering, internal input buffering, and the backpressure mechanism. Moreover, in order to support multiple paths between inlets and outlets, resequencers are deployed. Figure 1 shows the general structure of the multicast PIPN switch. In the figure, the packet recirculation structure is shown only for input port N-1 not to make it very complicated. Enhanced Distributor The distributor is composed of 2n-1 identical distributing elements (DE’s). Each DE is connected to two consecutive input ports and has two outlets. There is an internal input buffer of one packet size at either inlet of a DE. Packets entering the distributor are separated into two groups by assigning them either to the upper or to the lower DE outlets with equal probability. The upper/lower outlets of DEs are connected to the back plane/front plane of the router. DEs complement the destination address fields of the packets going into the front plane and set their complement fields to logical one. The complement fields of the packets going into the back plane are set to logical zero and their destination address fields remain the same. Backpressure lines are not shown in the figures not to make them very complicated.

392

S.F. Oktug

Fig. 1. General structure of the multicast PIPN

Enhanced Router The router is made of two 2n-1 x 2n-1 planes which are called the front plane and the back plane. The upper outlets of the DEs are connected to the back plane and the lower ones are connected to the front plane. Since sending a packet into the back plane or the front plane is equally probable, assignment of the distributor outlets to the planes has no significant importance. Each plane has n-1 stages and each stage has 2n-2 SEs. There are internal input buffers of size one at both inlets of SEs. The deployment and operation of SEs are the same as those in a baseline network. However, the interconnection structure of SEs in the PIPN is different than that of a baseline network. The internal structure of a 16x16 router is shown in Figure 2. The details related to the interconnection structure of the router planes can be found in [2]. Packets entering the router are transferred through the interconnected planes by using the information kept in their destination address fields just like in a baseline network. However, here, the destination address fields are inspected starting with the second most significant bit since the router planes have n-1 stages. When a packet reaches a paired SE, it moves to the other plane if it is not the loser side of a contention. The loser packet stays in the internal input buffer to be tried in the next time slot. With the use of input port buffering, internal input buffering, and the backpressure mechanism, packet loss at the internal stages of the switch is prevented. While moving packets from one plane to the other, the destination address and the complement fields are not modified. Packets continue their ways in the transferred plane without modifying their destination address fields.

A Multicast ATM Switch Based on PIPN

393

Fig. 2. Internal structure of a 16x16 router

Enhanced Output-Port-Dispatcher The packets reaching the outlets of the router are sent to the output-port-dispatcher in order to be routed to the requested output ports. The output-port-dispatcher is composed of the units of two types called deciders and collectors. If it is necessary (i.e. it is a multicast packet), a packet can be recycled back to an input port. Each inlet of the output-port-dispatcher can carry packets destined to four different output ports as shown in Figure 3. This is called the outlet grouping property of the PIPN. For unicast packets, inspecting their complement fields and the most significant bit of the destination address fields is enough to determine their actual destination addresses. However, for a multicast packet, the decider first checks if it needs to be recirculated by using its recirculation_tag which will be explained in the next section. If it is necessary, a copy of the packet is generated and send to the corresponding recirculation buffer. Then, the packet is dispatched to the collectors of the destined output ports which are in the same outlet group. It is possible to have a multicast packet destined to more than one output port which are in the same outlet group. In such a case, additional copies are generated in the deciders. There is a collector per output port. A collector can process four packets arriving within the same time slot, however, sends only one of them to the corresponding output port. Due to the multiple paths between an inlet-outlet pair and internal input buffering, out-of-order arrivals may occur at the collectors. To prevent out of order departures, a resequencer is deployed at each collector. As the resequencer structure the one proposed in [4] is selected. Fixed-waiting-time is used to set the minimum amount of time slots spent by the packets in the switch. Those packets that arrive outlets earlier wait in the resequencers.

394

S.F. Oktug

Fig. 3. Internal structure of the enhanced output-port-dispatcher

Operations Related to Multicasting The structure and the routing logic of the PIPN is very appropriate for multicast traffic. A packet which reaches a decider can be sent to four different output ports in the same group. So, if there is a packet destined to all four or some of these output ports in the same group, necessary copies can be generated from only a single packet arriving at the output-port-dispatcher. In this way, the load in the distributor and the router is reduced significantly. This property of PIPN is very meaningful when multicast traffic is applied. Multicast packets can be delivered to the requested outlets without making the environment overcrowded. Multicast Table and Multicast Packet Structure Whenever a new multicast connection is established, a new entry in the multicast table is created. This entry contains two important fields: multicast-outlets, and multicast-groups. Multicast-outlets is a binary array of size N showing the multicast outlets for a connection. Zeros and ones are used to represent if outlets take part in a multicast connection or not. Multicast-groups is a binary array of size N/4. It is obtained from multicast-outlets considering the outlet grouping property of the PIPN. Outlet groups are numbered from zero to N/4-1. If, at least, one outlet of an outlet group involves in the multicast connection, corresponding bit in multicast-groups is made one, zero otherwise. Packets in the multicast PIPN have three additional tags: packet-type, multicast-id, and recirculation-tag. Packet-type is a one bit field used to show if a packet carries a multicast or a unicast cell. Multicast-id is necessary to find the corresponding entry of

A Multicast ATM Switch Based on PIPN

395

a multicast packet in the multicast table. Recirculation-tag is used in the multicast tree generation. It specifies the packets to be recirculated in the deciders. Multiple Cell Generation The employed multiple packet generation technique is derived from the one used in [5]. In [5], Turner introduced the recycling technique in order to generate multiple copies of multicast packets. This technique is adapted to the multicast PIPN architecture after some modifications. In the modified version, a binary tree is constructed with the source switch inlet at its root and outlet group numbers at its leaves. Internal nodes also represent outlet group numbers and act as relay points by recycling packets. In [5], one of the packets generated regarding the tree structure is sent to an output port and the other is recycled. However, in the proposed switch, both copies reach the output ports to leave. If necessary, one of them (the one with a set recirculation-tag) can be used to generate additional copies as shown in Figure 3. Whenever a multicast connection is established, corresponding input port takes action to create a multicast table entry. Then first level branches of the tree are decided randomly by using multicast-groups. With the help of recycling packets, the multicast tree can be formed dynamically. An example multicast tree for a 16x16 multicast PIPN is given in Figure 4. Initially, the output ports are grouped. At each iteration, at most two copies of the multicast cell are generated. Outlet groups are selected randomly. The destination address field of such a packet keeps the address of an output port which is in that outlet group and involves in the multicast connection. If necessary, that packet can be marked to be recirculated, such as G2 in Figure 4.

Fig. 4. An example multicast tree for the proposed switch of size 16x16

396

S.F. Oktug

Results Performance of the enhanced PIPN is studied by simulation. The simulation environment is created on a SUN Ultra 10 by using the C programming language. The results obtained under unicast and multicast traffic are compared with those of other ATM switches. In order to use in comparisons, a banyan network based load distributing multicast ATM switch, similar to [5], is also simulated. The general structure of this switch is given in Figure 5.

Fig. 5. General structure of the banyan network based load distributing multicast switch

Enhancing PIPN causes increase in performance not only under multicast traffic but under unicast traffic also. In order show the performance gain obtained, the performance of the enhanced PIPN and the enhanced banyan network of size 128x128 is compared. It is also crosschecked that the simulation results obtained under uniform traffic confirm those presented in [6]. As the heterogeneous traffic pattern, communities-of-interest traffic, which can range from uniform traffic to extremely heterogeneous traffic by changing the community size, is used [7]. It is observed that enhanced PIPN performs better than the banyan network based switch which is enhanced using similar techniques. The arrivals in the multicast traffic are simulated by using independent and identically distributed Bernoulli processes where input load parameter may change between 0.0 and 1.0. The multicast fanout is calculated by using a model similar to the one used in [8]. There, the multicast fanout is defined as a random variable F with distribution density function P(F=f destinations) = 1/(f*f) where f is between 2 and the switch size, N. This function is normalized in order to cover switch size. The performance of the multicast PIPN is compared with that of the enhanced banyan network based load distributing multicast switch which also uses multicast tree approach to generate multicast packets and employs resequencers [5]. Currently,

A Multicast ATM Switch Based on PIPN

397

throughput

simulations are performed for the networks of size 16x16, and 32x32. It is calculated that the average fanout values for 16x16, and 32x32 switches are 4.08, and 4.98, respectively when the above mentioned multicast traffic is applied. Some results obtained for the networks of size 32x32 are shown in Figure 6.

1,1 1 0,9 0,8 0,7 0,6 0,5 0,4 0,3 0,2 0,1 0 0,05

pipn-thr-32 pipn-nrm-thr-32 distban-thr-32 distban-nrm-thr-32

0,1

0,15

0,2

0,25

0,3

multicast load

Fig.6. Throughput/normalized throughput obtained by the enhanced PIPN and the enhanced banyan network under multicast traffic for size 32x32 In this test fixed-waiting-times for the enhanced PIPN, and the enhanced banyan network are taken as 28 time slots, and 832 time slots, respectively. Fixed-waitingtimes are adjusted according to the performance of these switches under uniform traffic and the employed multicast tree approach. It is shown that as a result of the outlet grouping property of the PIPN, internal switch traffic does not increase tremendously. A single packet going through the router network is enough to generate multiple copies for the outlets in the same outlet group. Due to this property, multicast packets circulate a few times in the enhanced PIPN and fixed-waiting-time is kept smaller. Moreover, the delay experienced by networks of various sizes under various traffic types are also studied.

Conclusions In this paper a new multicast ATM switch which is based on the PIPN structure introduced earlier is proposed. The PIPN architecture is enhanced by employing input buffers, internal input buffers, the backpressure mechanism, and the recycling technique. Out of order departure of packets is prevented by deploying resequencers. It is shown that according to the multicast structure of the proposed architecture, multicast cells can be generated without overloading the interconnection network.

398

S.F. Oktug

Currently, the performance of the multicast PIPN is being compared with the banyan network based multicast ATM switches under various traffic patterns. It is shown that as the multicast traffic becomes heterogeneous, the performance of the proposed multicast ATM switch becomes better than many other multicast ATM switches due to its internal structure.

References 1. Guo M.H., Chang R.S, “Multicast ATM Switches:Survey and Performance Evaluation,” ACM Comp.Comm.Rev., Vol.28, No.2, Apr.1998 2. Oktug S.F., Caglayan M.U., “Design and Performance Evaluation of a Banyan Network Based Interconnection Structure for ATM Switches” IEEE JSAC, Vol.15, No.5, Jun 1997. 3. Oktug S.F., Caglayan M.U., “Evaluation of the Performance Enhancements for The Plane Interconnected Parallel Network,” Proc. IEEE Globecom’97, Nov.1997. 4. Turner J.S., Data Packet Resequencer for a High Speed Data switch, United States Patent, No.5,260,935, Nov.9, 1993. 5. Turner J.S., “An Optimal Nonblocking Multicast Virtual Circuit Switch,” Proc.IEEE Infocom’94, Jun.1994. 6. Theimer T.H., Rathgeb E.P, Huber M.N, “Performance Analysis of Buffered Banyan Networks,” IEEE Trans. on Comm., Vol.39, No.2, Feb.1991. 7. Chiussi F., Tobagi F.A., “A Hybrid Shared Memory/Space Division Architecture for Large Fast Packet Switches,” Proc.IEEE ICC’92, 1992. 8. Uzun N., Blok A., “Ten Terabit Packet Switch with SRRM Scheduling,” Proc. BSS’99, Jun. 1999.

Concurrent Access to Remote Instrumentation in CORBA-Based Distributed Environment Armin Stranjak1, Damir Kovačić2, Igor Čavrak2, Mario Žagar2 1 Lucent

Technologies, Cherrywood Science & Technology Park, Cabinteely, Co. Dublin, Ireland [email protected] 2 Faculty of Electrical Engineering and Computing, University of Zagreb, Unska 3, 10000, Zagreb, Croatia {damir.kovacic, igor.cavrak, mario.zagar}@fer.hr

Abstract. This paper describes a system architecture for a distributed measurement process. Base systems provide only low-level bus oriented communication protocol (realized with General Purpose Interface Bus hardware and software). Distribution and remote control [1][2] requirements led to the design of CORBA [3][4] (Common Object Request Broker Architecture) middleware objects [5][6] that abstract underlying hardware/software installation issues. This design addresses problems of authentication, authorization, provision of exclusive instrument access from one client by enabling instrument locking mechanism, and session oriented communication due to CORBA’s inability to provide satisfactory solutions to these matters. The central point of the design is the introduction of a special GPIB arbiter object. An arbiter object represents implementation of the factory pattern providing access to instrument objects for each client connecting to the arbiter. In order to secure uniqueness of connection session and allow authorization and authentication of remote clients, session oriented connection has been introduced. It was found as necessity to describe proposed solution in the form of a software design pattern[7][9].

1

Introduction

The concept of remote instrument access has followed a rapid development of computer networks and modern technology. Measurement systems represent only a small part of distributed applications or are used to offer acquisition services to interested parties or remote users. The remote instrumentation has grown from the need to overcome the obvious disadvantages of limited control and monitoring possibilities when the measurement process does not involve the separation of the physical location of measurement and instrumentation equipment and the location where data analysis is performed. The acquired data should often be distributed to multiple targets such as databases, monitoring and control applications etc. In order to satisfy the new requirements, one possible solution leads to the instruments equipped with a network interface and appropriate supporting software infrastructure necessary for that kind of connection. The concept introduces not only unwanted overhead on instrument manufacturers but it also excludes the existing measurement equipment as P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 399–408, 2001 © Springer-Verlag Berlin Heidelberg 2001

400

A. Stranjak et al.

non-compatible without the additional support of a hardware module providing direct network access. A solution involving an independent component equipped with a computer network interface and GPIB interface is more appropriate for the task since it does not require changes or the replacement of the existing measurement equipment. The first interface allows network connection with remote clients interested in acquisition, controlling or just collecting the measured data. The second interface is a GPIB based connection to the attached instruments. Such a solution should be based on embedded computer system [6] with limited memory space.

2

Distributed Measurement System

Distributed measurement systems (DMS) offer some widely recognized advantages such as increased performance due to exploiting concurrency and better resource utilization using shared devices. Distribution of tasks to multiple machines also improves scalability and reliability. The architectural part of DMS is usually based on the client/server architecture, which is a widespread concept in distributed environments and basically offers a simple approach in the establishment of a remote connection. Shifting from the two-tier architecture to the three-tier architecture reflects the need for a separate abstract layer between remote instrumentation and clients or data/information consumers due to improved and increased management of the measurement process as well as allowing easier monitoring of users rights in establishing connections with remote servers. In fact, the middle tier is populated with remote measurement servers representing the needed measurement processes. Fig 1 shows the main concept of the three-tier architecture. Remote application Remote application

Remote application Instrument 2 Server

Instrument 1 Server

Instrument 3 Server

GPIB service

Instrument

Instrument

Instrument

Fig. 1. Distributed three-tiered measurement architecture

The problem of defining a remote instrument interface to a certain level common to all instrument types represents a serious problem due to the diversity of equipment that can be part of such a measurement system. The problem complexity level can be reduced by using remote measurement servers primarily due to a simpler interface representation of a measurement process and measured data. Another major achievement using remote measurement servers is in handling large number of concurrent client connections. The problem of authentication, authorization or

Access to Remote Instrumentation in CORBA-Based Distributed Environment

401

securing of exclusive instrument access can be easily solved by using the abovementioned middle-tier component. Instrument servers are directly responsible for GPIB-based communication with the attached measurement equipment. Instrument servers are handled by measurement servers. The abstraction levels of the instrument server interface are lower than the measurement server interface since they are abstracted GPIB instruments only and do not support high-level actions related to the GPIB command set. The selection of the conceptual and implementation platform was a straightforward decision. CORBA[3][10] covers most of our requirements and satisfies all the tasks needed by complex distributed measurement system. Nevertheless, the mechanism of granting rights to clients or authorization and authentication should be solved outside of CORBA since there is no standardized or unified way to recognize remote clients. It is more appropriate to develop a separate module for the measurement server, which handles those activities. That concept will be described later.

3

Session-Oriented Remote Connection Using Arbiter Module

In general, an instrument connected to the public network can be viewed as a device shared between multiple remote clients. Such a device cannot satisfy client requirements concurrently, since each measurement usually requires some kind of setup procedure, which transforms the state of the device. If completely concurrent access to the same device would be allowed, that would lead to the possible corruption of measurement process and would yield unpredictable results. This problem is not unique to the measurement process. Similar problems arise in different areas, from traffic control to database systems. A simple approach is to grant exclusive access to the device for a limited period of time (to lease a device). The client who was granted exclusive access is responsible to configure and set up the device for the measurement process it desires. In order to prevent the corruption of the process, other clients are forbidden from accessing the device during that time. In other words, the measurement system establishes a session between the client and the instrument. Such a concept is well known in digital hardware design, where multiple devices are connected to the same system bus. In order to coordinate access to shared resource, the design includes the concept of bus arbiter (or bus controller), which grants and revokes the right to use the system bus from the devices that request it. The first step in establishing a session between the client and the target instrument is client authentication and authorization, which represents only a part of the overall security system. Although the Object Management Group (OMG) proposed an answer to this problem by defining the Security Service as a standardized CORBA service, this concept to date has not been implemented in an interoperable way. Thus, truly distributed CORBA based system has to implement access control through some other means. In the system described here, client authorization can be easily achieved since access to instruments is granted by a single Arbiter object. However, to ensure integral system security, it is required to perform this kind of communication through an encrypted channel. The underlying CORBA protocol, IIOP, is not cryptographically protected, but it is possible to tunnel the IIOP communication through a secure channel, for example by using SSL (Secure Socket Layer) or SSH

402

A. Stranjak et al.

(Secure Shell) tunneling. Since these issues are common to all CORBA based distributed systems, they are not further elaborated here. The authorized client still cannot access the instrument if it is already in use. Therefore, the measurement system has to have a way of distinguishing between different clients. Unfortunately, CORBA views object clients as anonymous entities. This prevents object implementation to query any information about the client so it basically disables the server side to distinguish clients that invoke operations on the server object. Such problem is frequently solved by applying Factory pattern, where the central component generates a unique object for each client requesting access to a particular object type. We have found that concept inappropriate for the distributed measurement system, because the instruments are typically located on different locations and attached to different computers. Each instrument in the system has been abstracted by a separate CORBA object that exports high level interface to facilities provided by the instrument. Such an instrument server process has to be instantiated on the computer to which the instrument has been attached, because it will use a low level API to perform the actual communication with the device. The implemented instrument servers are persistent, and would run independently of any arbitration logic. Such an approach was taken in order to improve the reusability of developed objects by decoupling client management (Arbiter object) from client-instrument communication. To provide session-oriented communication between the client and the instrument, it was necessary to introduce a special kind of information that would ideally be known only to the authorized client and the instrument. Such information should be provided by some external authorization service (in our case, from the Arbiter object) only to the two parties participating in the communication. This piece of information is called a session key. A similar idea is frequently used in dynamic WWW based applications where it is called a cookie. HTTP protocol itself is stateless, which presented serious problems for server based CGI applications. Due to the stateless nature of the underlying protocol, the server side application cannot distinguish between the large number of clients invoking operations that generate dynamic content displayed in client browser. Therefore, HTTP protocol was enhanced so that the server would be able to store small piece of information in the client memory space, and later retrieve it in order to recognize the client. Such an approach proved to be very successful, since it did not require major changes to the existing protocols and applications. Unfortunately, the introduction of session key bears changes in interface specifications to instrument servers. It is obvious that the instrument server has to retrieve the session key from the client for every operation invocation on the server. There are three possible ways to carry this information from client to server: • The session key can be transferred by using a context clause in IDL interface specification. The usage of this IDL feature has been deprecated[4] and not all CORBA tools support it. • The client can be a fully qualified CORBA object with a predefined interface, so that the server can perform callback operation and get the session key. This solution brings additional problems, because the server implementation has to take care about misbehaved clients (for example, when the client crashes during processing a server callback). It is especially

Access to Remote Instrumentation in CORBA-Based Distributed Environment



403

hard to avoid such problems if the server has to be realized as single threaded process. The server interface specification can include the session key as parameter in every operation parameter list. This solution is straightforward. The only drawback is a more complex server interface specification.

The instrument server implementation is responsible for verifying the client supplied session keys. The only question remained is which object is responsible for key generation. Obviously, the arbiter object has to have some kind of “private” interface to instrument servers, since clients initially communicate with the arbiter. This private interface is used to change session keys after each event. Events are generated for provided granting and revoking access right from client to instrument. M ea s urem e nt p ro ce d ure s

se

In strum en t A rbiter

n io ss

ke

y

re g is tra tio n, Ins trum e nt S e rv er IO R

c lient p ro file s, rights , ins trum e nt c onfig ura tions ...

In strum en t S erve r

registration

get instrument, release instrument

C lient

N am in g S ervic e

M iddletier components

Fig. 2. Component responsibilities in distributed measurement system

4

‘Arbiter Proxy’ Pattern for Concurrent Remote Access

We found it necessary to describe the mentioned concept in terms of software design patterns[7]. The usage of the described concept could be expanded to a various set of problems encountered in systems which are based on concurrent access to common and shared devices. It is often inappropriate to access a component directly and not recommended to hard-coded physical location into clients due to possible modifications or decreased capability to reuse and distribute components across several distributed platforms, so additional control mechanisms are needed. A solution should address the following forces: • Access exclusivity and scalability - only one client may use an instrument at the same time and access to the component should be transparent and simple. • Sharing capabilities - different clients are allowed to access different instruments at the same time on the same GPIB bus. • Centralized management - there should be only one additional CORBA object which takes care about the clients and the instrument management.

404

A. Stranjak et al.

The client will be establishing a connection with the remote instruments via the proxy component. This representative offers the interface of the component but performs additional pre- and post-processing such as client authorization and authentication, allowing exclusive instrument access etc. The descriptions and CRC cards of all CORBA interfaces involved in this design are shown in the Table 1. Table 1. CRC cards of all interfaces Class: Arbiter Responsibilities Provides the interface to instrument servers Takes care of authorization and authentication of clients Takes care of exclusive access to the instrument using the session key mechanism Collaborators InstrumentLock (through ORB) Class: AbstractInstrument Responsibilities Provides an interface for all instruments Ensures the usage of minimum actions needed for every instrument (such as identity etc.) Collaborators Class: Instrument Responsibilities Provides an interface for any specific instrument Implementation of GPIB commands Collaborators Client (through ORB) Class: Lock Responsibilities Provides an interface for setting session key Collaborators Class: InstrumentLock Responsibilities It is inherited from the Instrument and the Lock interface to allow the Arbiter to set the session key Collaborators Arbiter (through ORB)

Access to Remote Instrumentation in CORBA-Based Distributed Environment

405

Class: Client Responsibilities Uses interface to request IOR and session key from the Arbiter Invocation of instrument server methods Collaborators Instrument (through ORB) Arbiter (through ORB) The Arbiter interface describes the management component of all instrument servers and presents the proxy object for clients. It takes care of the authorization and authentication of clients using the session key for every single session established between the client and instrument server. On the client‘s request for an object reference (IOR), the Arbiter will supply the client with an IOR of the requested instrument server if: • instrument is not in used by any other client • client is allowed to send requests to the remote instrument represented with the instrument server The AbstractInstrument interface provides the interface implemented by the Instrument object (interfaced by Instrument) and is only an abstract representation of the remote instruments. The Instrument interface represents the interface for implementing and wrapping GPIB commands for every single instrument involved in the measurement process. The Lock interface allows setting of session key by Arbiter. The InstrumentLock interface is inherited interface from the Instrument and the Lock interface. Through this interface, communication between the Arbiter and the Instrument is established due to setting the session key for any specific session. The client will establish a connection using the Instrument interface so it will be unable to set the session key on its own and skip the Arbiter component. Fig. 3 shows the relationships between the interfaces, while the sequence diagram will bring a better view to described concept as shown in Fig 4. AbstractInstrument getIdentification()

Lock

Instrument

setSessionKey() communicates with

InstrumentLock

Client request/release instrument

allocates

Arbiter getIns trument() releaseInstrument()

Fig. 3. Relationships between interfaces

406

A. Stranjak et al.

: Client

Lock instrument : Arbiter

: Instrument Lock

getInstrument check = Is instrument in use?

Instrument is locked { check = true }

lockInstrument() { check = false } getReference()

Fetch instrument IOR reference from Naming Service

generateSessionKey()

setSessionKey( ) return instrument IOR and SessionKey

invoke methods using SessionKey releaseInstrument( ) generateSessionKey() New session key is generated in order to prevent instrument usage with old session key

setSessionKey( )

unlockInstrument()

Fig. 4. Typical dynamic scenario of Arbiter pattern structure

The client should send a request for the IOR reference (actually, for pointer to the remote CORBA object on the server side) of the Instrument Server to the Arbiter. First, the Arbiter will check if it is allowed to arbitrate the requested instruments in the Arbiter config file. If it does, Arbiter will check if any other client is using the Instrument. If the Instrument is not in used by any clients, the Arbiter will lock the instrument (set internal variable), retrieve the IOR reference from the Naming Service (The Naming Service is not shown on this sequence diagram), generate a unique session key which will be used by the Client and Instrument Server for preventing any other client which already knows IOR reference to establish communication with the Instrument Server because Instrument Server will not perform any method invocation without the correct session key. All mentioned actions are hidden in getInstrument method. After that, the Arbiter will send the generated session key to the Instrument Server and will send IOR reference as well as session key to the Client. Now, the Client is capable to invoke methods of the Instrument Server using this session key.

Access to Remote Instrumentation in CORBA-Based Distributed Environment

407

After Instrument Server is no longer needed, the client should unregister itself through the Arbiter to allow other clients to get access. The Arbiter will generate a new session key and send it to the Instrument Server. In this way previous clients are prevented from accessing the instrument with an expired session key. There is no risk if one client has got the IOR of an instrument but has released the connection, it still cannot reconnect to the instrument because it does not know the session key which is placed on the Instrument Server. But, what if the client tries to set its own session key? To prevent that, it was necessary to create derived IDL interface (InstrumentLock interface) from the IDL interface of instrument (Instrument interface) and that derived interface is used only by the Arbiter side. The derived interface will have one additional method just for setting the session key from the Lock interface. Clients are using the Instrument interface only and will not be able to “see“ that additional method. The Fig. 5 represents that concept.

Instrum en t interface

Instrum ent Server

Ins

r te bi ce Ar erfa t in

tru int men erf tLo ac ck e

Client

Instrum ent Arbiter

Fig. 5. Principal overview of interconnection between main components

5

Conclusion

This article describes the problems encountered during the design and development of a distributed measurement systems in heterogeneous environment. Therefore this paper is not focused on primary tasks performed by the measurement system since they are usually solved in a straightforward manner. We have found that building such systems frequently brings similar secondary requirements that have significant impact on the architecture of the measurement system. The issues mentioned are not specific for this area, since they appear in many different areas of computing. The described concept could be expanded to a various set of problems encountered in systems based on concurrent access to common and shared devices. Therefore we found it appropriate to describe this concept in the form of a software design pattern, in order to reuse knowledge in other specific areas of computer science. We believe that introducing CORBA-based mobile agents could bring even more benefits to the existing model leading to a completely new concept of distributed measurement systems. The current model relies heavily on network availability and

408

A. Stranjak et al.

performance, while disabling possibility of offline operation. This promising technology will be the focus of our future work.

References th

1. Žagar M., Oršulić J., Čavrak I.: Remote Instrument Access Using Remote Method Calls. 4 IEEE Mediterranean Symposium on Control & Automation, Chania, Crete, June 10-14, 1996. 2. Čavrak I., Stranjak A., Žagar M.: Remote Access to GPIB-Based Equipment Using Public th Computer Networks. 19 International Conference on Technology Interfaces, Pula, June 17-20, 1997. 3. -: CORBA 2.0/IIOP Specification. Object Management Group, 492 Old Connecticut Path, Framingham, 1996. 4. Seán Baker: CORBA Distributed Objects – Using Orbix. Addison Wesley, 1997. 5. Čavrak I., Stranjak A., Žagar M.: CORBA-based Remote Instrumentation. IEEE th MELECON ’98, 9 Mediterranean Electrotechnical Conference, Tel Aviv, Israel, May 1820, 1998. 6. Žagar M., Kovačić D., Stranjak A., Kurešević A.: Embedded CORBA-based System For nd Remote Instrument Access. 2 International Workshop on Design, Test and Applications, Dubrovnik, Croatia, June 14-16, 1999. 7. Buschmann F., Meunier R., Rohnert H., Sommerlad P., Stal M.: A System of Patterns. John Wiley & Sons, 1996. 8. Larman C.: Applying UML and Patterns. Prentice Hall PTR, 1998. 9. Gamma E. et all, Design Patterns¸ Addison-Wesley, 1994. 10. Henning M., Vinoski S., Advanced CORBA Programming in C++, Adison Wesley, 1999. 11. Jacobson I., Booch G., Rumbaugh J., The Unified Software Development Process, Addison Wesley, 1999.

Design and Implementation of CORBA-Based Integrated Network Management System 1

Joon-Heup Kwon and Jong-Tae Park 1

2

st

HyComm Incorporated, 2674 N. 1 St. Suite 210, San Jose, CA 95134, U.S.A. [email protected] 2 School of Electronic and Electrical Engineering, Kyungpook National University 1370 SanKyug-Dong, Buk-Gu, Taegu, 702-701, Korea [email protected] Abstract. There have been several research works for the CORBA-based network management system (NMS). After the JIDM ’s work, ITU-T’s SG4, Committee T1’s T1M1.5, and a number of working groups are working on the development of CORBA-based TMN framework. In this paper, we design and implement a integrated NMS platform in which manage both pure CORBAbased NMS system, and legacy SNMP/CMIP-based NMS system revising JIDM CORBA/CMIP, CORBA/SNMP gateways. For the efficient implementations, we propose a new CORBA naming service, Smart Naming (SN) service. We also design the Multiple-Object Operation (MOO) service according to T1M1.5’s specification. Finally, the performance of the system has been evaluated by measuring the response time and the system resource usage to demonstrate the efficiency of the proposed system.

1. Introduction Recently, the Common Object Request Broker Architecture (CORBA) is increasingly noticed as the base technology for the realization of higher layer functions of network management architecture. There have been several research works for the realization of a CORBA-based NMS system. The most significant work of the approach was that of the Joint InterDomain Management (JIDM) task force: [1] [2] [3] [4] [5]. JIDM Specification Translation (ST) describes the translation algorithm for mapping of the CMIP/SNMP management information to the CORBA IDL [4]. According to JIDM ST, GDMO/ASN.1 to IDL and SNMP SMI to CORBA IDL translators have been implemented [6], [7]. JIDM Interaction Translation (IT) describes the dynamic converting mechanisms for management information between CORBA and other legacy network management protocols [5]. However, since JIDM most focused on the interoperability between CORBA-based system and legacy CMIP or SNMP system, the capability of CORBA was not fully utilized. Working Group T1M1.5 of Committee T1 and Study Group 4 (SG4) of ITU-T are presently defining the specification on pure CORBA-based TMN framework. T1M1.5 is defining CORBA-based network management framework with two draft standards: [8], [9]. [8] deals with framework requirements, CORBA COS usage, non-standard COS for the framework, and information modeling guidelines, and [9] specifies information models, defining a set of generic interfaces and constants based on P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 409–421, 2001 © Springer-Verlag Berlin Heidelberg 2001

410

J.-H. Kwon and J.-T. Park

M.3100. SG4 is currently revising the recommendations M.3000 and M.3010 for adopting CORBA as one of standard communication architecture of TMN [10], [11]. However, T1M1.5’s work has some limitations to realize integrated NMS system in the sense that it focuses only on the management of telecommunication network. In this article, we propose platform architecture for integrated network management. To do so, we revise JIDM’s CORBA/CMIP and CORBA/SNMP gateway according to T1M1.5’s framework, propose a new CORBA naming service, the Smart Naming (SN) service for efficient gateway system resource usage, and design and implement T1M1.5’s Multiple-Object Operation (MOO) service for our platform [8]. In section 2, we present the basic architecture of the platform introducing Virtual Network Element (VNE) concept, and design naming tree architectures for each gateway. We design the SN service and the MOO service in Section 3. In Section 4, the implementation details and the performance evaluation are described, and, finally, we present our conclusion in Section 5

2. Platform for Integrated Network Management In this section, we introduce the platform architecture and design the naming trees in each CORBA/CMIP and CORBA/SNMP gateway. Fig. 1 shows the network element (NE) architecture within the CORBA-based TMN framework defined by T1M1.5 and SG4. According to the framework, there are CORBA-based MOs within an NE. The CORBA manager and CORBA MOs communicate each other directly using CORBA Common Object Service (COS) and framework support services defined by T1M1.5. The containment relationships between MOs are represented by the naming tree, which is formed by using CORBA naming service. CORBA COSS Naming Service Notification Service Telecom Log Service Messaging Service Security Service Framework Support Service Factory Finder Service Channel Finder Service Terminator Service Multiple-Object Operation Service

CORBA Manager q reference point Network Element (NE)

CORBA-based TMN

Naming Tree according to the containment relationship between MOs

CORBA-based MOs Resources

Fig. 1. Network element in CORBA-based TMN framework 2.1 The Virtual Network Element (VNE) To represent each legacy CMIP/SNMP- based NEs, we form Virtual NEs (VNEs) that consist of a set of proxy objects. Fig. 2 shows the basic architecture of the VNE.

Design of CORBA-Based Integrated Network Management System

411

A VNE in the gateway consists of a set of Proxy Managed Objects (PMOs) for CORBA/CMIP gateway, or Proxy Leaf Nodes (PLNs) for CORBA/SNMP gateway. A PMO represents a MO in legacy CMIP based NE, and a PLN represents a Leaf Node of the MIB tree of SNMP agent. A CORBA manager interacts with PMOs or PLNs, and the actual interactions with legacy CMIP or SNMP agent are performed through Proxy Agent (PA) object. A PA represents a CMIP or SNMP agent. PA actually performs the protocol conversion task. CORBA Manager q reference point CORBA/CMIP or CORBA/SNMP Gateway (Transformation Function)

Virtual Network Element (VNE) Naming Tree

CORBA-based TMN CORBA-based Proxy MOs (PMOs) or Proxy Leaf Nodes (PLNs)

Proxy Agent Object CMIP or SNMP

Legacy CMIP or SNMP Network Element

Legacy CMIP or SNMP Agent

Real resources

Fig. 2. The basic concept for VNE

The IDL definitions for PMOs are made according to [8], and the IDL definitions for PLNs are made by SNMP SMI to CORBA IDL translator [6]. 2.2 Design of Naming Tree for CORBA/CMIP Gateway Using CORBA naming service, a CORBA manager object can locate and access a PNE or PLN object instance with its meaningful name. In this section, we design the naming tree for the CORBA/CMIP gateway according to [8]. Within a CORBA/CMIP gateway, there are several VNEs that represent each target CMIP-based NE. and a VNE consists of a number of PMOs. These PMOs are organized by a naming tree according to the containment tree of the target CMIPbased NE. Fig. 3 shows the naming tree formed in CORBA/CMIP gateway.

CORBA/CMIP Gateway VME Naming Tree

CMIP-based Equipment CMIP Agent

Local Root Proxy Agent Object “ProxyAgent”.””

Containment Tree Create Naming Tree According to the Containment Tree Of target TMN agent [T1M1.5-2000/029]

: Name Binding

Proxy Managed Object (PMO)

TMN Managed Object (MO)

Fig. 3. Naming Tree in CORBA/CMIP Gateway

412

J.-H. Kwon and J.-T. Park

Besides those PMOs, a Proxy Agent (PA) object is also instantiated in a VNE. We use the IDL definition of PA object defined in JIDM IT [9]. Multiple object operation like CMIP scoping/filtering operations are performed by Multiple-Object Operation (MOO) service defined by T1M1.5 [8]. The PA instance is bounded to local root naming context so that MOs in the VNE easily locate and perform operations from CORBA manager. 2.3 Design of Naming Tree for CORBA/SNMP Gateway In this section, we design the naming tree for CORBA/SNMP gateway in our platform. Since T1M1.5 does not consider the management of the Internet, we form a naming tree for CORBA/SNMP gateway according to the MIB tree information of a target agent. Since there is no IDL interface definition for SNMP, we use the SNMP SMI to CORBA IDL translator that performs the translation task [6]. For the actual interaction with SNMP agent, we also place PA in VNE. We use the IDL definition of PA defined in [5]. In CORBA/SNMP gateway, there are PLNs that represent leaf nodes of the MIB tree of SNMP agent. In this section we define the naming convention for these PLNs. Every leaf nodes in the SNMP MIB tree has their own OID.

Host : 155.230.14.49

Non-Tabular entry sysDescr (system discriminator) OID : 1.3.6.1.2.1.1.1

KIND field ID field “155.230.14.49” NULL “1” NULL “3” NULL “6” NULL “1” NULL “2” NULL “1” NULL “1” NULL “1” NULL “Object” NULL CosNaming::Name

Fig. 4. Example OID conversion to CORBA name In Fig. 4, the name of PLN, which represents the leaf node, sysDescr (system discriminator), is mapped into a CORBA name.

SNMP Equipment

CORBA/SNMP Gateway Naming Tree Local Root 1 3 Proxy Agent for SNMP (PA_SNMP) 6 Object 1 1 2 1 1 Object 1 2 : Name Binding

Object

MIB Tree

Create Naming Tree According to the MIB Tree of target SNMP agent

Proxy Leaf Node (PLN)

MIB Tree iso (1) org (1.3) dod (1.3.6) internet (1.3.6.1) directory (1.3.6.1.1) mgmt (1.3.6.1.2) mib-2 (1.3.6.1.2.1) system (1.3.6.1.2.1.1) sysDescr(1.3.6.1.2.1.1.1) sysObjectID(1.3.6.1.2.1.1.2)

Leaf Node

Fig. 5. Naming Tree in CORBA/SNMP Gateway

Design of CORBA-Based Integrated Network Management System

413

To address the SNMP agent, the IP address of the agent is inserted in the first name component of the CORBA name. And every component of the OID value of the system discriminator (sysDescr, 1.3.6.1.2.1.1.1) is inserted into each name component. The last name component contains “Object”.”” indicating the PLN object instance itself [8]. Fig. 5 shows the naming tree architecture for CORBA/SNMP gateway. Naming context objects form a naming tree according to the MIB tree of VNE agent, so that CORBA manager can access a PLN according to the OID value of a target leaf node.

3. Design of the Smart Naming (SN) Service and the Multiple-Object Operation (MOO) Service In this section, we design the new naming service, SN service, in order to utilize the gateway system resources more efficiently, and the MOO service, which is defined by T1M1.5 but is not a standard OMG CORBA service, for the platform [8]. 3.1 Design of SN Service Before designing SN service, we first present problems occurred when the conventional OMG Naming Service is utilized. Network Element (4) Managing Object

Conventional Naming Service

(2)

“Object”.“”

(3)

IOR



Name Bindings Naming Context Object

(1)

Object Instance

PMO or PLN Object Instance

Fig. 6. Resolving an managed object with the conventional naming service With the conventional naming service, PMO or PLN object should be instantiated [12]. The reason is that the conventional naming service uses the Interoperable Object Reference (IOR), whish is standard object reference of CORBA object ‘instance’ to build a name binding [3], [12]. Fig.6 shows the procedure of getting an IOR to a CORBA-based managed object instance. The procedure in the figure is as follows: (1) the object should be instantiated providing its IOR to build the name binding. (2) When a CORBA manager asks the naming context to return the IOR of the instance, (3) The naming context locate the name binding, and then, return the IOR to the manager. (4) With the IOR, manager access to the instance and perform operations. In gateway system, there are millions of proxy objects. With conventional naming service, all proxy objects should be instantiated at the same time to make a naming tree. However, the object instances do not participating in network management at the same time. It means that, part of the system resource is assigned to instances that are not

414

J.-H. Kwon and J.-T. Park

working at a moment. So, there must be other way for the efficient use of the system resources. Fig. 7 shows the IDL definition of SN service. SN service adds one data structure, Inst_Info, one interface, IS, and one method in naming context, bind_sns, to the IDL definition of OMG naming service. The name binding of the conventional naming service consists of two components: the name and IOR of an object. But, the name binding of SN service has one more component for information for instantiating an object. The instantiation information is defined as a structure named Inst_Info (in Box A). MO_Class_Name contains the class name of the object, and Real_Resource_ID indicates the actual MO or leaf node.

// SNS.idl #include “CosNaming.idl“ module SNS { typedef CosNaming::Istring Istring; typedef CosNaming::Name Name; typedef CosNaming::BindingList BindingList; interface BindingIterator : CosNaming::BindingIterator; struct Inst_Info{ string MO_Class_Name; unsigned long Real_Resource_ID; };

A

interface NamingContext : CosNaming::NamingContext{ void bind_sns(in Name n, in Inst_Info i) raises( NotFound, CannotProceed, InvalidName, AlreadyBound); };

B

interface IS{ Object inst(in Inst_Info order) raises( NotFound, CannotProceed, InvalidName, AlreadyBound); }; };

C

Fig. 7.IDL definition of SN service

The definition of the naming context of SN service is shown in box B. It inherits from that of conventional OMG naming service. Therefore, a CORBA manager can resolve a managed object instance in the same way of conventional OMG naming service [13]. The method, bind_sns, is for building a naming context with the instantiation information. With this method, the name binding of a PMO or PLN is built without instantiating it. The definition of the Implementation Storage (IS) is in box C. IS is an object factory. The method, inst, is for instantiating the object specified in the parameter, order.

CORBA/TMN Gateway (2) CORBA manager

(3-a)

(7) Real MO

Naming Context

Inst_Info …

“Object”.“” Name Bindings

Obj_Ref (8) (1) (3-b) (6) (4) Instantiation PMO instance

Implementation codes for each MO class IS

on at i

iz on hr nc y )S (5 (9) Garbage Collection

IOR

Fig. 8. Resolving an managed object with the SN service

Garbage Collector (GC)

Design of CORBA-Based Integrated Network Management System

415

Fig. 8 shows the procedure of the resolve operation in CORBA/CMIP gateway. The function block, Garbage Collector (GC) is to release the system resources assigned to instances that is not used for a long time. It periodically checks the PMO instances list. When it finds an instance that has not participated in any network management operation, it releases the system resources assigned to the instance, and sets the value in the Obj_Ref field of the name binding of garbage to NULL. Since GC is an internal function block of SN service, so there is no IDL definition of GC in the SN service.idl. The procedure is as follows: (1) The name binding of the PMO is built with the instantiation information. (2) When a CORBA manager request naming context, the naming context checks the existence of the instance checking the Obj_Ref. (3-a) If exist, the naming context should just return the IOR of the instance. (3-b) If not, the naming context should pass the instantiation information in the Inst_Info field IS to instantiate the object. (4) With the MO_Class_Name, the factory object instantiates the class. (5) the PMO is synchronized with the real managed object specified by the Real_MO_ID. (6) The naming context inserts IOR of the new instance in the Obj_Ref. (7) The naming context object returns IOR. (8) With the IOR returned, the CORBA manager performs operation. (9) GC releases the system resource assigned to instances that are not used for a while. 3.2 The Multiple-Object Operation (MOO) Service Since CORBA does not have the multiple object access capability, operations such as CMIS scoping and filtering operation (scoped get, scoped update, scoped delete) are supported by the Multiple-Object Operation (MOO) Service defined by T1M1.5 [10]. MOO service is not standard OMG CORBA COS. MOO is the one of them. T1M1.5 defines two MOO service interfaces [8]: BasicMooService - scoped get operation, AdvancedMooService - scoped update and delete operations. CORBA manager invoke operations MOO to perform multiple-object operation. MOO service receives scoped operations from CORBA manager, selects appropriate MOs according to the naming tree, and invokes operations of those instances. Fig. 9 shows the procedure of the scoped get operation defined on the BasicMooService interface.

1. Scoped Get Request

MOO Service

2. Select MOs according to the request According to the Naming Tree Naming Tree

CORBA Manager Object

4. Return replies

BasicMooService Object

3. Perform get operations per object

Fig. 9. The Procedure of The MOO service [scoped get] The procedure is like this; (1) CORBA manager object send scoped get operation to the BasicMooService. (2) The object selects a set of object according to the

416

J.-H. Kwon and J.-T. Park

parameters form CORBA manager object and the naming tree, and (3) performs get operation on each MO. (4) BasicMooService object make the response that contains every response returned from MOs. We design MOO service applicable for both CMIP and SNMP-based system. MOO service is placed in the same computing platform with CORBA/CMIP and CORBA/SNMP gateways for performance reason [12]. For handling replies from CMIP or SNMP agents, we used Multiple Reply Handler (MRH), which was introduced in JIDM [9]. Fig. 10 shows the procedure of the CMIP scoped get operation of the BasicMooService object in CORBA/CMIP gateway. Other scoped operations (scoped update and scoped delete) have similar procedure.

1. Scoped Get Request

CORBA Manager Object

CORBA/CMIP Gateway

TMN Network Element

MOO Service 2. Request (M_GET)

5. Return

CMIP Agent

4. Replies 3. Perform the scoping operation

MRH

BasicMooService Object CORBA Based TMN

CMIP Based TMN

Fig. 10. The MOO service in CORBA/CMIP gateway [scoped get]

The procedure is like follows; (1) A CORBA manager object send scopedGet operation to the BasicMooService specifying the name of base object, the scope, names of attributes, the filtering expression, etc. (2) The object converts the request to the CMIS scoped get request, and send it to the target TMN agent. (3) The CMIP agent performs the scoped operations and sends the results to MRH. (4) MRH object receive these replies from TMN agent, and send it to the BasicMooService Object. (5) BasicMooService object make the response that contains every response returned from MOs. The GET-BULK operation of SNMPv2 is the only multiple operation in SNMP domain. The operation is supported by scopedGet operation of BasicMooService object. Note that the first component of the name of VNE leaf node is IP address of a computer. With it, the BasicMooService object tells that the request is the SNMP bulk operation. The BasicMooService object directly send request to SNMP agent instead of invoking operation of each PLN. Fig. 11 shows the procedure of the scoped get operation of the BasicMooService interface.

CORBA/SNMP Gateway 1. scopedGet Request

MOO Service

SNMP Equipment

2. Request (GET-BULK) SNMP Agent

CORBA Manager Object

4. Return replies

3. Reply

BasicMooService Object

Fig. 11. The MOO service in CORBA/SNMP gateway [SNMPv2 get-bulk] The procedure is like follows: (1) A manager object sends scopedGet operation to the BasicMooService specifying the name of base object, which corresponds to the OID of a node. (2) The object converts the request to the SNMPv2 GET-BULK

Design of CORBA-Based Integrated Network Management System

417

operation, and sends it to the target SNMP agent. (3) The agent performs the operation, and a reply is sent to the BasicMooService object. (4) The BasicMooService object converts the response to CORBA response format, and sends it to the manager.

4. Implementation and Performance Evaluation SN service: Name binding is internal data structure of naming service. So there is no IDL level definition for name binding. The structure of the name binding of SN service contains a name, instantiation information, and IOR of an object instance. Fig. 12 shows the structure of name binding in SN service. // SNS_Impl.h #include “SNS.hh” // . . . struct NameBinding{ SNS::Name_var SNS::Inst_Info_var CORBA::Object_var }; // . . .

name; inst_info; Obj_Ref;

Fig. 12. The structure definition of SN service Name Binding

In the structure, Obj_Ref, is to indicate that the object already exists or not. If the object is not instantiated, the value in the field is NULL. Otherwise, the field contains the IOR of the object. As described in Section 3.1, GC is an internal function block of SN service. GC has its own table which contains the list of the instances that was created by IS, periodically checks the time stamps for each instance inspecting the difference between the time-stamp and the current time exceeds the predefined timeout value. Once GC finds an object instance timed-out, GC releases the resource that has been assigned to the object instance, and set the value of Obj_Ref field to NULL.

Interaction through the Gateway: Fig. 13 shows the interaction procedure through CORBA/CMIP gateway. The Multiple Reply Handler (MRH) object, defined by JIDM for CORBA/CMIP gateway, receives one or multiple replies from TMN agent, converts the replies to CORBA form, and passes them to the appropriate PMO. The operation procedure is as follows: (1) the CORBA manager first locates the appropriate PMO through the naming tree, and (2) sends a request. (3) PMO invokes the appropriate operation of PA. (4) PA converts the request into CMIP/CMIS format, and (5) sends the request to the target agent. (6) The agent performs the operation, and (7) sends the response to MRH. (8) MRH convert the response to CORBA format and pass it to PMO. (9) The PMO sends the result to the manager.

J.-H. Kwon and J.-T. Park

TMN Equipment 4. Convert to CMIP request PA 3. Pass the CORBA request and name of PMO

9. Res

ponse

1. Access to PMO using DN 2. Request on PMO

PMO

MRH

8. Pass the CORBA response

CORBA Based TMN

5. Request nse

espo 7. R

TMN Agent OSI Protocol Stack

CORBA Manager Object

CORBA/TMN Gateway

CMIP/CMISE

CORBA IIOP

CORBA-based Network Management System

OSI Protocol Stack

418

6. Perform the operation

MO Containment Tree

CMIP Based TMN

Fig. 13. Interaction through CORBA/CMIP Gateway

Fig. 14 shows the interaction procedure through CORBA/SNMP gateway. A CORBA manager access to a PLN through the naming context using the OID value of and perform network management operation. The operation procedure is like follows: (1) a manager first locates the appropriate PLN, and (2) invokes an operation supported by the PLN. (3) the PLN invokes the appropriate operation of PA. (4) PA converts the request into SNMP format, and (5) send it to SNMP agent. (6) The agent performs the operation, and (7) send the result to PA. (8) The PA converts the reply to CORBA format and passes it to PLN, and (9) The PLN object send the response to the manager.

CORBA-based Network Management System

SNMP network element 5. Request

4. Make appropriate SNMP request

SNMP Agent

PA

1. Access to PLN 2. Request on PLN

3. Invoke operation Of PA

PLN

8. Return the CORBA response

SNMP

9. R esp ons e

SNMP Protocol Stack

7. Response SNMP Protocol Stack

CORBA Manager Object

CORBA/SNMP Gateway (Q adaptor)

6. Perform the operation

Fig. 14. Interaction through CORBA/SNMP Gateway Experimental Results: Fig. 15, Fig. 16 and Fig. 17 show the result of our performance evaluation. The performance of SN service and conventional naming service are comparatively evaluated. We use Orbix 2.3 [23] and implemented in SUN SPARC 1000 system. As the first phase, we assumed that there are 1000 MOs in a managed system. With the conventional naming context, 1000 MOs and 1001 naming context objects are instantiated, and, otherwise, with SN service, only 1001 naming context objects are instantiated initially. The manager object accesses 100 objects at a time, and the target objects are selected by uniform random sampling. With 2 seconds time interval, the manager object perform the operation 50 times. The time out value for GC is set to 10 seconds.

Design of CORBA-Based Integrated Network Management System

419

Response Time(ms)

80 70 60 50 40 30 20

C o n v e n t io n a l N S SNS

10 0 2

12

20

28

36

44

52

Time(ms)

60

68

76

84

92

100

Fig. 15. response time of conventional naming service and SN service: the average response time required to get the IORs of 100 MO instances comparing that of the conventional naming service and that of SN service. As time goes on, the average response time merge. 80

Resource (Kb)

70 60 50 40 30 20

C o n v en tio n a l N S S NS

10 0 2

10

18

26

34

42

50

58

66

74

82

90

98

Time(ms)

Fig. 16. The volume of memory of conventional naming service and SN service: Though the memory required for SN service is increased, it remains shorter than conventional NS. Though the response time of SN service is longer than that of the conventional naming service at first, as time goes on, the response time get reduced, and finally it becomes slightly longer than conventional naming service. The reason is that once an object is instantiated, it lasts before the time stamp in the instance expires. However, the volume of the system resources assigned to network management operations with SN service was quite smaller than that of the conventional OMG naming service. As the second phase, we checked the response time while increasing when there is relatively large number of proxy objects. We increased the number of proxy objects and checked the average response time of the proxy objects. The average response time is the time when SN service is in the steady state. We increased the number of objects from 100 to 100,000. Fig. 19 shows the result of the experiment.

Response Time(ms)

70 60 50 40 30 20 C o n v e n tio n a l N S S NS

10 0 1

10

20

30

40

50

60

The Number of Proxy Objects

70

80

90

1 00

x103

Fig. 17. Response time of conventional naming service and SN service

420

J.-H. Kwon and J.-T. Park

When the number of proxy objects exceeds 70,000, in other words, the volume of proxy objects exceeds the system memory space, the system starts swapping. When the number of proxy objects is around 85,000, the response time of each naming service eventually same. As the number of proxy object is increased, the response time of SN service is shorter than that of the conventional naming service. As long as the system memory of gateway system is not boundless, the swapping occurs whenever the volume of proxy objects exceeds the volume of system memory.

5. Conclusion In this paper, we have developed a new CORBA-based network management platform in which pure CORBA-based management application and traditional SNMP or CMIP agent systems can be interoperable very effectively. It is noted that the CORBA/CMIP or CORBA/SNMP gateway specification proposed by JIDM does not deal with the construction of the naming tree, so that they cannot be inter-operable with the pure CORBA-based approach proposed by ANSI T1M1.5. We have designed the system, which can operate with robustness even in the case where there are thousands of managed objects to be handled. With the conventional OMG CORBA naming service, all of those managed objects may need to be instantiated all at the same time. These may shut down the system, or may deteriorate the performance of the system so. Smart Naming (SN) service not only provides tools to avoid these situations, but also it saves the memory space required for the platform. SN service provides an efficient way to build a naming tree within CORBA/CMIP and CORBA/SNMP. In addition, we have also designed the Multiple-Object Operation (MOO) service defined by T1M1.5. While directly invoking operations supported by PA, the MOO service reduces the number of interactions between MOO service objects and PMO or PLN, and efficiently performs the CMIS scoping/filtering operations and SNMPv2 GET_BULK operation within CORBA/CMIP and CORBA/SNMP gateway. We have designed the operational procedures of network management operations in CORBA/CMIP or CORBA/SNMP gateway. It is found that the platform system is operating satisfactorily.

References 1. 2. 3. 4. 5.

N. Soukouti and U. Hollberg, “Joint Inter Domain Management: CORBA, CMIP and SNMP,” Proceeding of the 5th IFIP/IEEE International Symposium on Integrated Network Management, May 1997, pp.153-164. PROSPECT Consortium, D33A: Concepts for CORBA/TMN interworking, Deliverable Number: AC052/GDM/WP3/DS/S/003//b1, May 1997. Graham Chen and Qinzheng Kong, “Integrated TMN Service Provisioning and Management Environment,” Proceeding of the 5th IFIP/IEEE International Symposium on Integrated Network Management, May 1997, pp.99-112. X/Open and NMF, Inter-domain Management: Specification Translation, Open Group Preliminary Specification P509, March 1997. The Object Management Group (OMG), “Interworking Between CORBA and TMN Systems Specification,” version 1.0, formal/2000-10-01, October 2000.

Design of CORBA-Based Integrated Network Management System 6. 7. 8. 9. 10. 11. 12. 13.

421

Jong-Tae Park, Moon-Sang Jeong and Seong-Boem Kim, "A platform architecture for the Integration of CORBA Technology within TMN Framework," IEICE Transactions on Communications, Vol.E82-B, No.11, pp.1770~1779, November 1999. ORBYCOM, GDIDL: a GDMO/ASN.1 to IDL translator, 1998, See also http://www.orbycom.fr Committee T1 – Telecommunications Working Group T1M1.5, “Working Document for Draft Standard ANSI T1.2xx-2000, Framework for CORBA-Based Telecommunications Management Network Interfaces,” August 2000. Committee T1 – Telecommunications Working Group T1M1.5, “Working Document for Draft Standard ANSI T1.2xx-2000, CORBA Generic Network and NE Level Information Model,” June 2000. ITU-T – Study Group 4, “ Overview of TMN Recommendations,” Oct. 1999. ITU-T – Study Group 4, “Draft Revised Recommendation M.3010 – Principles for a Telecommunications Management Network,” Oct. 1999. The Object Management Group (OMG), “Event Service Specification,” OMG Document formal/2000-06-15, version 1.0, June 2000. The Object Management Group (OMG), “Naming Service Specification,” OMG Document formal/2000-06-19, Version 1.0, April, 2000.

Framework for Real-Time CORBA Development 1

1

Z. Mammeri , J. Rodriguez , and P. Lorenz

2

1

IRIT, Toulouse, France {mammeri, rodrigue}@irit.fr 2 IUT de Colmar, Colmar, France [email protected]

Abstract. Object-oriented real-time applications require enforcement of end-to-end timing constraints on service requests from clients to servers in a distributed computing environment. Thus, timing aspects should be integrated and handled particularly by CORBA which is considered as a standard to support distributed object-oriented applications. In spite of the release of a (real-time) RT-CORBA specification, a few vendors have ported their ORBs (Object Request Brokers) to real-time operating systems. In this paper we analyze existing RT-CORBA implementations, and we propose a framework that integrates the main components (scheduling, real-time communication, end-to-end quality of service providing, etc.) necessary for implementation of RT-CORBA to support static and dynamic real-time applications.

1. Introduction With the advent of increasingly complex applications that depend on timely execution, many distributed computer systems must support components capable of real-time distributed processing [3, 22, 36, 39]. That is, these applications require enforcement of end-to-end timing constraints on service requests from clients in a distributed computing environment. In the last years, the object-oriented (OO) technology became increasingly popular. This technology has prevailed over non-real-time computing as it reduces the development complexity and maintenance costs of complex applications and facilitates reuse of components. To deal with the complexity of design, analysis, maintenance and validation of real-time applications, the real-time systems engineering community is more and more interested in using OO technology at different levels, mainly: design level, programming level and middleware level. Thus, timing aspects should be integrated and handled at different levels: at specification and design levels, at programming language level and at middleware level. To take into account these needs, various works are particularly undertaken within the OMG to extend UML, JAVA and CORBA to make them suitable for real-time applications. The main extensions focus on scheduling, memory management, concurrency, and communication management to guarantee end-to-end quality of service [36]. This paper deals with Real-Time CORBA (RT-CORBA). P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 422–437, 2001 © Springer-Verlag Berlin Heidelberg 2001

Framework for Real-Time CORBA Development

423

The ability to enforce end-to-end timing constraints, through techniques such as global priority-based scheduling, must be addressed across the CORBA standard. The approach is to assume a networked architecture that consists of an underlying system with its network, an ORB, and Object Services, all with real-time requirements. The real-time requirements on the underlying systems include the use of real-time operating systems on the nodes in the distributed systems (supporting applications) and the use of adequate protocols for real-time communication between nodes in these distributed systems. Thus, several aspects have to be apprehended, mastered and developed. However an important step towards distributed real-time systems supported by CORBA is the introduction of concepts related to the time constraints in CORBA, without modifying basically the original CORBA. In spite of the release of an RT-CORBA specification [27,29], a few vendors have ported their ORBs (Object Request Brokers) to real-time operating systems. Nevertheless, some experimental implementations of RT-CORBA are being (or have been) developed. In this paper we analyze existing RT-CORBA implementation, and we propose a framework that integrates the main components (scheduling, real-time communication, end-to-end quality of service providing, etc.) necessary for implementation of RT-CORBA to support static and dynamic real-time applications. The development of RT-CORBA necessitates many mechanisms resulting from realtime systems, networks, distributed systems, and the object-orientation. We emphasize the difficulties and complexity of this development. In section 2, an overview of the real-time CORBA architecture is given. In section 3, the main work in RT-CORBA is summarized and discussed. The framework we propose for the development of RT-CORBA is presented is section 4. Some conclusions are given in section 5.

2. Real-Time CORBA Architecture Overview Real-time CORBA deals with the expression and enforcement of real-time constraints on end-to-end execution in a CORBA system [23]. This section presents the key features most relevant for researchers and developers of distributed real-time systems [35]; it focuses on RT-CORBA with static priority scheduling; the dynamic scheduling is not integrated yet to RT-CORBA. In 1995, a Special Interest Group (SIG) at OMG was formed to initiate the RTCORBA and assess the requirements and interest in providing real-time extensions to CORBA model by defining the common terminology and concepts for use in developing real-time extension, introducing the needs of RT-CORBA market showing what technology extensions are necessary, and indicating what real-time extensions to CORBA are feasible [23]. The need for a common specification for RT-CORBA arises for the same goals that have driven standard CORBA specification: transparent distribution, heterogeneity, portability and interoperability. In January 1998, the OMG released the first request for proposal (RFP) for extending CORBA to make it suitable for real-time systems [24]. The responses to this RFP were analyzed and an RT-CORBA specification (version 1.0) have been issued and integrated in CORBA 2.4 [29]. RT-CORBA 1.0 focuses only on static priority scheduling; dynamic scheduling is under work at OMG. A dynamic CORBA

424

Z. Mammeri, J. Rodriguez, and P. Lorenz

environment is one in which clients and servers may be added and removed, and where constraints may change [28]. Developing CORBA systems that meet functional requirements within real-world timing constraints requires that the ORB exhibits a level of predictability (bounded latency of operation invocations, bounded message transfer delays), with respect to the timings for its various behaviors. Given that an ORB has to perform more than one activity at time, the allocation of the resources (processor, memory, network bandwidth, etc.) needed for those activities also has to be controlled in order to build predictable applications [24]. RT-CORBA 1.0 specification defines features that support end-to-end quality of service (QoS) for operations in fixed-priority CORBA applications [27]. RT-CORBA is defined as extension to CORBA [26] and the messaging specification [25]. RT-CORBA based systems will include the following four major components, each of which must be designed and implemented taking into account the need for end-to-end predictability [27]: - scheduling mechanisms in the operating system (OS), - real-time ORB, - communication transport handling timing constraints,

-

applications specifying timing constraints.

Not to over constraint no-real-time application development, RT-CORBA is positioned as a separate extension to CORBA (see Fig. 1). The set of capabilities provided by RT-CORBA is optional. An ORB implementation compliant to RTCORBA 1.0 must implement all RT-CORBA except the scheduling service which is optional. Thread pools. Many distributed applications have complex object implementations that run for variable duration. To avoid unbounded priority inversion and deadlock, real-time applications often require some form of preemptive multithreading. RTCORBA addresses these concurrency issues by defining a standard thread pool model. This model enables server developers preallocate pools and set some thread attributes (default priority, and so on). Server developers can optimally configure thread pools to buffer or not buffer requests, thus providing further control over memory usage. Priority mechanisms. RT-CORBA defines platform-independent mechanisms to control the priority of operation invocations. Two types of priority are defined: CORBA priorities (handled at CORBA level) and native priorities (priorities of the target OS). RT-CORBA supports two models for the priority at which a server handles requests from clients: Server declared priority model (the server dictates the priority at which object invocations are executed), and Client propagated model (the server honors the priority of the invocation set by the client). Scheduling. Scheduling is of prime importance to guarantee timing constraints of requests issued by clients. RT-CORBA 1.0 specification targets fixed-priority scheduling. RT-CORBA scheduling service defines a high level (i.e., different of the scheduling service of the operating systems) scheduling service so that applications

Framework for Real-Time CORBA Development

425

can specify their scheduling requirements (worst case execution time, period, and so on) in a clear way independent of the target operating system. Managing inter-ORB communication. Contrary to CORBA standard, which supports location transparency, RT-CORBA lets applications control the underlying communication protocols and endsystems to guarantee a predictable QoS. This can be achieved by two mechanisms: selecting and configuring protocol properties, and explicit binding to server objects. An RT-CORBA endsystem must integrate mechanisms that support protocols to guarantee timeliness of communications (i.e., bounded transfer delays and jitter). According to used network (ATM, TCP/IP, FDDI, and so on), the mechanisms are very different. Interfaces to specify timing constraints. A real-time ORB must provide standard interface so that applications can specify their resources requirements and timing constraints. The policy framework defined by CORBA messaging specification lets applications configure ORB end-system resources to control ORB behavior. Real-time ORB services. RT-CORBA ORBs must preserve efficient, scalable and predictable behavior for high level services and application components. Use of timeouts. RT-CORBA application may set a timeout on an operation invocation in order to bound the time that the client application is blocked waiting for a reply. This can be used to improve the predictability of the system.

3. Related Work One attended many work on CORBA and real-time the five last years. Thuraisingham et al. [42] were among the first to discuss the main extensions to the object model, the ORB, object adapters and IDL to take into account timing constraints. The work in real-time CORBA has taken two major directions: 1) Real-time above CORBA without CORBA extensions: proposals were developed trying to provide mechanisms to support real-time applications above CORBA without any modification or extension to standard CORBA [6, 7, 9, 10, 21, 22, 30, 31, 43]. Some of the previously mentioned work proposed to deal with real-time as follows: install CORBA on real-time OS (Operating System), and realize faster version of ORBs by removing features like dynamic invocation, use protocols with fixed connections between clients and servers. This approach is necessary in an RTCORBA, but it is not sufficient for predictable behavior guarantee. The work in this direction targeted soft real-time applications (sometimes with best effort), and considered that CORBA should remain a general-purpose middleware and it should not be extended to be suitable for real-time applications. Since CORBA 2.4 version, new mechanisms suitable for real-time have been integrated in CORBA, thus such a direction of research is considered nowadays inappropriate for real-time applications that require some guarantee of timing constraints.

426

Z. Mammeri, J. Rodriguez, and P. Lorenz

Client

Scheduling Service

RT CORBA:: Current

Server Servant

CORBA:: Current

RT CORBA::Priority

P OA

RTP OA

RT CORBA:: Threadpool

RT CORBA:: RTORB

ORB

IIOP (GIOP/TCP )

ESIOP

Existing CORBA entity

Others

RT CORBA:: PriorityMapping

R T-CORBA entity

Fig. 1. RT- CORBA Extensions (from [27])

2) Real-time with CORBA extensions: the objective of the work in this direction is to investigate how existing CORBA can be extended to provide support for real-time computing. The extensions considered IDL (to specify end-to-end QoS execution of applications), ORB (resource management algorithms), and client and server [5, 20, 40, 44, 45, 46, 47]. This work has contributed to the establishment of the RT-CORBA specification as it is integrated in CORBA 2.4. -

-

Some RT-CORBA implementations are being developed: TAO at the university of Washington (it is the most advanced implementation of RT-CORBA, and it is also the most used) [34], MITRE Real-time CORBA at MITRE corporation [41], ARTDOM project at MITRE corporation [44], RapidSched, a trademark of Tri-Pacific [46], Epiq project extending TAO at University of Illinois at Urbana-Champaign [2], Realize at University of California, Santa Barbara [6, 21], UCI TMO project at university of California (Irvine) [8], Dynamic Real-time CORBA at US Navy Research and Development laboratories and the University of Rhode, Island [47].

Some of the proposed implementations contain many of the real-time ORB extensions defined in RT-CORBA specification [27, 35]. The main differences between the previously cited work lie in aspects like targeted applications (hard or soft real-time applications), timing constraints and QoS, IDL extensions, scheduling techniques, resource protocol management, and communication protocols. All proposed

Framework for Real-Time CORBA Development

427

implementations started whereas the RT-CORBA specification was not known yet and consequently, they are not compliant with CORBA 2.4. Their great merit is that they contributed to the development of RT-CORBA specification within the OMG.

4. A Framework for RT-CORBA Development Real-time applications cover a very broad spectrum of domains (ranging from very critical systems, like nuclear installations, to multimedia applications for children) and require methods, tools and platforms very different from a domain to another. In particular, to support real-time applications by CORBA several types of RT-CORBA products are necessary. We use the term “RT-CORBA profile” to indicate an RTCORBA product which meets the needs of a particular application class. In addition, the development of complex systems and applications can be made efficiently only if one can use (re-use) “components” that have been developed and tested. Nowadays, there is an increasingly marked tendency towards the use of commercial-off-the-shelf components. In this section, we show the main components for RT-CORBA profile development. Existing work on RT-CORBA (see section 3) brings solutions on particular points, for particular contexts. This work (often) lacks total and generic sight to approach RT-CORBA, thus making it very hard (even impossible) to build RT-CORBA with components which fulfil the needs of various specific applications. To fill this gap, we propose a general framework for the development of RT-CORBA allowing to better see the elements (components) which are parts in RT-CORBA development. Such a framework is adaptable and can switch scheduling algorithms, communication protocols, and other policies and system components depending on the needs and the environment. Our framework is based on two concepts: RT-CORBA profiles (which are instantiation of the generic framework) and components (which enable reuse and abstraction during RT-CORBA development). Developing RT-CORBA profiles requires to consider several aspects discussed hereafter, and shown in Fig. 2 and 3. 4.1 Classification of Real-Time Applications Real-time applications to run above RT-CORBA are very numerous and span a large spectrum of domains. Application requirements lead to differentiate hard and soft real-time constraints [15,38]. Applications imply hard real-time constraints when a single failure to meet timing constraints may result in an economical, human or ecological disaster. Soft real-time constraints are the case when timing faults cause damages which cost is considered tolerable under some conditions on fault frequency. Within these two classes, there may be periodic, aperiodic and sporadic operations (i.e., object requests in the case of an OO application). For soft real-time applications, there may be firm or non-firm deadlines. Some real-time applications require deterministic QoS. Others require statistical QoS. And others require both deterministic and statistical QoS. The degree of validation/verification/test depends heavily on the criticalness of real-time applications. Thus the means to deploy (their costs, their complexity) are dependent on the application nature (criticalness).

428

Z. Mammeri, J. Rodriguez, and P. Lorenz

The classification of real-time applications enables to elaborate the models of the constraints and QoS to be handled by RT-CORBA (i.e., what should be handled? and what is the required QoS?). An RT-CORBA profile should be associated with each class of real-time applications. 4.2 RT-IDL Standard (i.e., non-real-time) IDL has been extended to handle only priority of client requests [29]. Nevertheless, such an extension is not sufficient, for almost real-time applications. New extensions are necessary to specify different constraints and QoS according to the class of considered applications. The new RT-IDL should specify: application type (hard or soft), type of requests (periodic, aperiodic, sporadic), deadlines, type of deadlines (firm or non-firm), worst execution times, relationships between requests, distribution functions for aperiodic requests, minimum interarrival times for sporadic requests, quality of service (response time bounds, jitter bounds, and so on), … 4.3 Mapping of Timing Constraints and QoS onto RT-CORBA Once the timing constraints and QoS parameters are specified using RT-IDL, their QoS have to be mapped onto RT-CORBA mechanisms. The mapping leads to the definition of attributes used by underlying mechanisms, particularly threads and messages scheduling. For some hard real-time applications, static binding of objects is necessary. For others, the load is not known, and binding is dynamic. For some applications, a call admission control procedure has to be defined to enable a server to test if the load associated to a client requests may be guaranteed or not. For some applications, a step of QoS negotiation between client and server are necessary before any object operation invocation. There may be renegotiations according to changes occurring at client and/or server level. One challenge is to specify the various mappings of timing constraints and QoS parameters onto RT-CORBA mechanisms according to each class of RT-CORBA profile. The work is hard! 4.4 Scheduling, Concurrency Control and Schedulability Analysis Scheduling of threads that treat client requests is of prime importance to guarantee (eventually with some probability) the timing constraints associated with requests. In the present version (i.e., 1.0) of RT-CORBA, only static scheduling is supported. Nevertheless, in most complex real-time systems (RTSs), static scheduling is not sufficient, since many non-predictable resource conflicts influence execution times. Therefore, dynamic scheduling is required for such RTSs. In the context of hard real-time applications, Rate Monotonic algorithm [13] and Deadline Monotonic algorithm [11] are currently used for static scheduling. Earliest Deadline First [13], and Least Laxity First [1] are used for dynamic scheduling. Nevertheless, these four algorithms are somewhat ineffective for soft real-time

Framework for Real-Time CORBA Development

429

applications with numerous constraints, it is why other techniques (such as techniques based on generic algorithms or neural networks) are used in practice. Real-time application classes Hard real-time applications

Soft real-time applications Firm deadlines

Periodic

Sporadic

Non-firm deadlines

Aperiodic Periodic

Sporadic

Aperiodic

Periodic

Sporadic Aperiodic

Mapping application’s timing constraints and QoS into RT-CORBA

Global schedulability analysis Thread schedulability analysis

RT-CORBA Profile

RT-CORBA Profile

RT-CORBA Profile

Message schedulability analysis

Fig. 2. RT-CORBA profiles for Real-time applications.

To develop powerful RT-CORBA profiles, it is necessary: to classify existing scheduling algorithms and define their performances, to select scheduling algorithms according to the constraints to be handled, to classify existing resource management protocols and define their performances, - to select a management protocol according to the constraints to be handled, - to achieve a schedulability analysis. -

In a distributed system running above an RT-CORBA, client sites and server sites use scheduling algorithms (note that a client site may use a scheduling algorithm different from the one used by the server site). Many work in real-time scheduling exist [15], and has to be adapted to develop RT-CORBA. The ideal would be to have a tool that automatically selects a scheduling algorithm given the constraints of the client requests. To achieve such an ideal, existing algorithms should be classified and their performances specified; the algorithm selection should be based on algorithm performances, and not on their internal functioning. Thus, scheduling algorithms will

430

Z. Mammeri, J. Rodriguez, and P. Lorenz

be considered as components to develop RT-CORBA profiles. Much work remains to be made to clearly specify scheduling components. Real-time object-oriented computing poses the need to control concurrent access to objects under timing requirements (prevent deadlock, minimize priority inversion). As proposed in [37], it is necessary to combine semantic locking and resource management protocols (such as Priority Inheritance Protocol, Priority Ceiling Protocol, Stack Resource Policy) for concurrency control in real-time object-oriented systems. As for scheduling, resource management protocols should specified as reusable components. Once the scheduling algorithms and resource management protocols selected, it is important for major real-time applications to analyze the schedulability of the threads (tasks) composing an application. Commercial-off-the shelf tools, like PERTS [14] and TimeWiz -a trademark of TimeSys corporation-, may be used to know the requests for which the timing constraints will be met, and those for which the constraints will not be met. According to the results of the analysis (number of guaranteed requests, number of timing faults, maximum timing faults for each periodic request, and so), some adjustment or modification may be necessary. 4.5 Real-Time Communication CORBA was created targeting applications in general, which desire transparency in the distribution and in the way that resource are managed. Besides, the CORBA interoperability (IIOP – Internet Inter-Orb Protocol) is designed for general-purpose systems, using TCP connections. Standard CORBA GIOP/IIOP interoperability protocols are not well suited for real-time applications with stringent latency and jitter constraints because TCP lacks predictability. The issues of scheduling and load balancing can never be fully resolved without thorough knowledge of communication protocols, which allow participating parties to exchange information. Real-time communication is particularly tricky due to uncertainties in the network, such as loss of messages or node failures, so that guaranteeing message delivery is difficult unless special measures are taken. Much work has been carried out to analyze the performances of networks and the provided QoS. RT-CORBA profiles should benefit from existing and approved results. In particular, much papers have been published concerning how to set up, and parameterize existing networks and protocols to deal with real-time communications in the Internet [3], in ATM [18], or in LANs [16]. Based on the existing work in real-time communication, we propose to handle timing constraints and QoS in RT-CORBA profiles as follows: 1) build a real-time messaging component, 2) Specify and negotiate traffic parameters and QoS, and 3) analyze schedulability of messages. Real-time messaging component As shown on Fig. 3, an RT-CORBA profile uses a real-time message component. Such a component may be obtained in different ways combining different components:

Framework for Real-Time CORBA Development

-

-

431

At the first level, the RSVP -Resource ReSerVation Protocol- [32] or another reservation protocol may be used for the bandwidth reservations to provide some QoS. No protocol should be used, if the reservation problem is dealt with by the upper level. At the second level, a transport protocol, a network protocol or directly a data link protocol has to be chosen, and a mapping with previous choice has to be done. At the third level, a physical network (Ethernet, FDDI, token bus, …) should be chosen, and a mapping with previous choice has to be done.

Traffic parameters and QoS specification and negotiation Several real-time message components may be defined; each one has its own internal components. It is necessary to have an interface that gives an abstraction of the realtime messaging component for the ORB. Such an interface achieves the following functions: - It enables the ORB to specify the traffic parameters and QoS independently of the chosen real-time messaging component. - It maps the traffic parameters and QoS onto the chosen real-time messaging component. Connections (of TCP/IP or ATM, for instance) parameters are defined at this level. Some connections are statically established (for applications with hard real-time applications). Some others are dynamically negotiated. Message schedulability analysis The (absolute or statistical) predictability of message transfer delays must be established by using automatic tools of message scheduling analysis. Such tools depend on the hierarchy of used protocols (ATM, IP, …). For each real-time messaging component an analysis tool may be defined or a commercial-off-the-shelf tool (like PERTS, TimeWiz, Opnet, etc.) may be acquired. Note that the translation of traffic parameters and QoS of client requests into parameters of communication protocols requires a number of decisions to be made, it is a complex problem which is a challenge to take up in the future by real-time and network research communities. Saksena [33] gave an example of automatic synthesis of QoS in a restricted context (a uniprocessor architecture with hard real-time constraints) and showed the impact of choosing one or several threads on QoS.

432

Z. Mammeri, J. Rodriguez, and P. Lorenz Client

Server Objects Scheduling Rate Monotonic Earliest Deadline First Least Laxity First … Priority Inheritance Protocol Priority Ceiling Protocol Stack Resource Policy Genetic Scheduling Algorithm Neural Network Scheduling

RT-IDL

Thread pools



RTPOA Synchronized clock

RTORB

Interface for traffic parameter and QoS specification and negotiation GIOP

Real-time messaging component

RSVP

Operating system

Generalpurpose OS

Other protocols

Real-time OS

TCP/IP

ATM



Others

Ethernet, token bus, FDDI, …

Fig. 3. Components of RT-CORBA profile.

Framework for Real-Time CORBA Development

433

4.6 Operating System One important component for RT-CORBA profiles is the operating system supporting these profiles. An OS may be a general-purpose OS (like Unix), an RTOS (like VxWorks), or another type of OS. The OS performances (number of priorities, context switch overhead, dispatching, resource locking mechanisms, etc.) considerably influence the performances of RT-CORBA profiles. The choice of an OS to build an RT-CORBA profile is crucial. Levine et al. [12] proposed the following recommendations to decrease nondeterminism and limit priority inversion in OSs that support real-time ORB middleware: -

Real-time OS should provide low, and deterministic context switching.

-

To reduce latency, OS should execute system calls in the calling thread context, rather than in a dedicated I/O worker thread in the kernel.

-

Real-time OS should integrate the I/O subsystem with ORB middleware (i.e., integrate the scheduling performed by the I/O subsystem with other OS resource management strategies to process packets according to the priorities of threads destined to receive them).

-

Real-time OS should support QoS specification and enforcement (they should integrate admission control and so on).

-

Real-time OS should provide tools to determine sources of overhead experienced by threads.

-

Real-time OS should support priority inheritance protocols to handle priority inversion.

4.7 Clock Synchronization In a distributed real-time application running over an RT-CORBA, the timings constraints (like deadlines specified by the clients and guaranteed by the servers) refer to a global time. Thus each RT-CORBA profile should integrate a mechanism (an algorithm) to synchronize clocks. The most commonly used clock synchronization algorithm is NTP [19]. Nevertheless, NTP may be not suitable for some real-time applications requiring a high clock synchronization accuracy, and it is necessary to use other algorithms. To facilitate RT-CORBA profiles, clock synchronization should by specified as components with their performances [4, 17]. Clock synchronization algorithm selection is driven by the properties (synchronization accuracy, faulttolerance and overhead of the algorithms) of global time required by applications. 4.8 Global Schedulability Analysis The schedulability analysis of threads and messages taken individually is necessary but it is insufficient. One must have tools to achieve a global schedulability analysis, i.e., an analysis taking into account all the components of a real-time system (a set of

434

Z. Mammeri, J. Rodriguez, and P. Lorenz

clients, a set of servers, a set of communication protocols, a set of scheduling algorithms, etc.).

5. Conclusion The demand for real-time applications that encompass everything from video-ondemand and real-time telephone system management to traditional embedded systems is increasing significantly. We believe a new generation of real-time applications is now possible due to two parallel streams of research. First, the development of widespread standardized object-oriented middleware that supports the development of applications built from components using high-level abstractions of the underlying computational and network infrastructure. This is realized in the CORBA ideal, as it allows for an application to use components that are identified dynamically and without regard to location. Second, support for quality-of-service constrained computations by the underlying infrastructure has also risen. This is realizable with the introduction of real-time POSIX, ATM, RSVP, and IPV6. Until very recently, these two developments have been progressing along non-intersecting trajectories, however convergence could result from real-time extensions to CORBA. Some extensions necessary for static real-time applications have been accepted by the OMG and are part of CORBA 2.4. Other extensions are under study to fulfill the needs of dynamic applications. The RT-CORBA defines which are the basic components to develop a system that actually meets real-time requirements. Delivering end-to-end QoS for distributed real-time OO applications remains a significant challenge for the next decade(s). As far as we know, TAO is the most advanced tool that implements RT-CORBA. Software developing companies are still mistrustful of RT-CORBA, to invest time and money in order to put on the market RT-CORBA software. The mains reasons to this mistrust are: 1) RT-CORBA is not yet completely defined within the OMG, and 2) the OO approach is not commonly accepted, in practice, by engineers and developers of the real-time domain. The difficulties of developing RT-CORBA are that much concepts have to be integrated and combined to achieve an RT-CORBA. In this paper, we have presented a generic framework to study the different mechanisms (components) used to build an RT-CORBA. The spectrum of real-time applications is so large that it is necessary to define and implement a large number of RT-CORBAs. We introduced the concept of RT-CORBA profile to take into account the diversity of the constraints to handle. The field of OO distributed real-time systems is young and it is growing quickly because it provides such a wide spectrum of applicability in many domains. RTCORBA is one of the success key, others such as RT-UML, and RT-JAVA, have to be considered. One could think that having resolved the issues with real-time scheduling, load balancing, and real-time communication, would let the researchers and practitioners sleep quietly, but that is not so. Knowing what algorithms and protocols to use is just a tip of an iceberg; one needs to apply these concepts in real circumstances. In other words, intensive development and verification procedures are needed to prove that at least some of these concepts work.

Framework for Real-Time CORBA Development

435

References 1. Dertouzos M.L., and Mok A.K.L.: Multiprocessor on-line scheduling of hard real time tasks. IEEE Trans. on Soft. Eng., Vol. 15, 12. (1989) 1497-1506 2.

Feng W., Syyid U., and Liu J.W.-S.: Providing for an open, real-time CORBA. In Proceedings of the IEEE Workshop on Middleware for Real-Time Systems and services, San Francisco, December (1997)

3. Ferguson P., and Huston G.: Quality of service: delivering QoS on the Internet and in corporate networks. John Wiley & Sons Inc. (2000) 4. Fonseca P., and Mammeri Z.: A framework for the analysis of non-deterministic clock synchronisation algorithms. In Lecture Notes in Computer Science n° 1151 (1996) 159-17 5. Hong S., Min D., and Han S.: Real-Time Inter-ORB protocol on distributed environment. In Proceedings of the 1st IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC'98). Kyoto (20 - 22 April, 1998). 449-456 6. Kalogeraki V., Melliar-Smith P., and Moser L.: Soft real-time resource management in CORBA distributed systems. In Proceedings of the IEEE Workshop on Middleware for Real-time Systems and Services. San Francisco (Dec. 1997) 7. Kalogeraki V., Melliar-Smith P., and Moser L.: Dynamic scheduling for soft real-time distributed object systems. In Proceedings of the 3rd IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, ISORC'00. Newport Beach, California (15 - 17 March, 2000) 114-121. 8. Kim K.H.K.: Object structures for real-time systems and simulators. IEEE Computer, Vol. 30, No. 8 (August 1997) 62-70 9. Kim K., Shokri E., and Crane P.: An implementation model for time-triggered messagetriggered object support mechanisms in CORBA-compliant COSTS platforms. In Proceedings of the 1st IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC'98). Kyoto, Japan. (20 - 22 April, 1998) 12-21 10. Kim K., Beck D., Liu J., Miyazaki H., and Shokri E.: A CORBA service enabling programmer-friendly object-oriented real-time distributed computing. In Proceedings of the Fifth International Workshop on Object-Oriented Real-Time Dependable Systems. Monterey, California (18 -19 November, 1999) 101-107 11. Leung J., and Whitehead J.W., On the complexity of fixed priority scheduling of periodic real-time tasks.: Performance Evaluation 2(4) (December 1982) 237-250 12. Levine D., Flores-Gaitan S., and Schmidt D.C.: An empirical evaluation of OS support for real-time CORBA Object Request Brokers. In Proceedings of the MultiMedia Computing and Networking Conference (MMCN’2000), San Jose (January 25-27, 2000) 13. Liu C., and Layland J.W.: Scheduling algorithms for multiprogramming in a hard real-time environment. Journal of ACM, Vol 20, n°1. (1973) 46-61 14. Liu J.W.S., Rendondo J.L., Deng Z., Tia T.S., Bettati R., Silberman A., Storch M., Ha R., and Shih W.K.: PERTS: A prototyping environment for real-time systems, Technical report UIUCDCS-R-93-1802, Department of computer science, University of Illinois, (May 1993) 15. Liu J.W.S.: Real-time systems. Prentice Hall (2000) 16. Malcolm N., and Zhao W.: Hard real-time communication in multiple-access networks. Journal of Real-Time Systems (8) (1995) 35-77

436

Z. Mammeri, J. Rodriguez, and P. Lorenz

17. Mammeri Z., and He J.: Modeling and timing performance analysis of deterministic clock synchronization algorithm. 9th International Conference on Parallel and Distributed Systems (PDCS’96). Dijon, France (September 25-27, 1996) 219-224 18. Mammeri Z., Delay jitter guarantee for real-time communications with ATM network. Second IEEE International Conference on ATM. Colmar, France (June 21-23 1999) 146155 19. Mills D.L.: Network Time Protocol (NTP), RFC 1305 (March 1992) 20. Montez C., Fraga J., Oliveira R., and Farines J.-M.: An adaptive scheduling approach in real-time CORBA. In Proceedings of the 2nd IEEE International Symposium on Objectoriented Real-time Distributed Computing (ISORC'99) Saint-Malo, France (May 2 - 5, 1999) 301-309 21. Moser L.E., Narasimhan P., and Melliar-Smith P.M.: Object-oriented programming of complex fault-tolerant real-time systems. In Proceedings of the 2nd IEEE Intern. Workshop on Object-Oriented Real-time Dependable Systems (WORDS’96) Laguna Beach, California (February 1996) 116-119 22. Nett E., Gergeleit M., and Mock M.: An adaptive approach to the object-oriented real-time computing. In Proceedings of the 1st IEEE Intern. Symposium on Object-oriented Realtime Distributed Computing (ISORC’98) Kyoto, Japan 20-22 April 1998. 23 Object Management Group.: December 5, 1996.

Real-Time CORBA. A white paper - Issue 1.0. OMG

24 Object Management Group.: Real-Time CORBA 1.0 – Request for Proposal. Document/Orbos 97-09-31. January 19, 1998. 25. Object Management Group.: CORBA Messaging Specification. OMG Document ORBOS/98-05-05 (May 1998) 26. Object Management Group.: The Common Object Request Broker: Architecture and specification. 2.3 (June 1999) 27. Object Management Group.: Real-Time CORBA Joint Revised Submission. Document orbos/99-02-12 (March 1999) 28.

Object Management Group.: Dynamic scheduling, Document/Orbos/99-03-32 (October 25, 1999)



Request

for

Proposal.

29. Object Management Group.: The Common Object Request Broker: Architecture and Specification v2.4. OMG October 2000 30. Polze A., and Sha L.: Composite objects: real-time programming with CORBA. In Proceedings of the 24th Euromicro conference, Vaesteras, Sweden (August 25-27, 1998) 997-1004 31. Polze A., Wallnau K., Plakosh D., and Malek M.: Real-time computing with off-the-shelf components – The case for CORBA. Parallel and Distributed Computing Practices. Vol. 2, N° 1 (1999) 32. R. Braden et al.: Resource ReSerVation Protocol (RSVP) 31 September 1997 33. Saksena M.: Towards automatic synthesis of QoS preserving implementations from objectoriented design models. In Proceedings of the 5th International Workshop on ObjectOriented Real-Time Dependable Systems (WORDS’99). Monterey, California (18 - 19 November, 1999) 93-99 34. Schmidt D.C., Levine D.L., and Mungee S.: The Design of the TAO real-time object request broker. Computer Communications 21 (1998) 294-324

Framework for Real-Time CORBA Development 35. Schmidt D.C., and Kubns F.: An overview of the real-time Computer (June 2000) 56-63

437

CORBA specification.

36. Shokri E., and Sheu Ph.: Real-time distributed object computing: an emerging field. Computer (June 2000) 45-46. 37. Squadrito M., Esibov L., DiPippo L.C., Wolfe V.F., Cooper G., Thuraisingham B., Krupp P., Milligan M., and. Johnston R: Concurrency control in real-time object-oriented systems: the affected set priority ceiling protocols. In Proceedings of the 1st IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC'98) Kyoto, Japan (20 - 22 April, 1998) 96-105 38. Stankovic J.A.: Misconceptions about real-time computing. Computer (1988) 21 10-19 39. Stankovic J.A.: Distributed real-time computing: the next generation. Technical report TR92-01. Dept. of computer science, University of Massachusetts (1992) 40. Sydir J.J., Chatterjee S., and Sabata B.: Providing end-to-end QoS assurances in CORBAbased system. In Proceedings of 1st IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC'98) Kyoto, Japan (20 - 22 April, 1998) 53-61 41.Thuraisingham B., Krupp P., Schafer A., and Wolfe V.F.: On real-time extensions to the Common Object Request Broker Architecture. In Proceedings of the Object Oriented Programming, Systems, Languages, and Applications (OOPSLA’94) Conference (Oct. 1994) 42. Thuraisingham B., Krupp P., and Wolfe V.F.: On real-time extensions to Object Request Brokers: position paper. In Proceedings of the 2nd IEEE Workshop on Object-Oriented Real-Time Dependable Systems (WORDS '96) (1996) 182-185 43. Usländer T., Lebas F.X.: OPERA: A CORBA-based Architecture Enabling Distributed Real-Time Simulations. In Proceedings of 2nd d IEEE International Symposium on Objectoriented Real-time Distributed Computing (ISORC'99). Saint-Malo France (May 2 - 5, 1999 ) 241-244 44. Wohlever S., Wolfe V.F., Thuraisingham B., Freedman R., and Maurer J.: CORBA-based real-time trader service for adaptable command and control systems. In Proceedings of the 2nd IEEE International Symposium on Object-oriented Real-time Distributed Computing (ISORC'99). Saint-Malo France (May 2 - 5, 1999) 64-71 45. Wolfe V.F. and al.: Real-time method invocations in distributed environments, Technical Report. University of Rhode Island (1995) 95-244 46. Wolfe V.F., DiPippo L., Bethmagalkar R., Cooper G., Johnston R., Kortmann P., Watson B., and Wohlever S.: RapidSched: static scheduling and analysis for real-time CORBA. In Proceedings of the 4th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS’99). Santa Barbara, California (27 - 29 January, 1999) 3439 47. Wolfe V.F., DiPippo L.C., Ginis R., Squadrito M., Wohlever S., Zykh I., and Johnston R.: Expressing and enforcing timing constraints in a dynamic real-time CORBA system. International Journal of Time-Critical Computing Systems, 16 (1999) 253-280

Development of Accounting Management Based Service Environment in Tina, Java and Corba Architectures 1

2

2

Abderrahim Sekkaki , Luis Marco Cáceres Alvarez , Wagner Tatsuya Watanabe , 2 and Carlos Becker Westphall 1

Department of Mathematics and Computer science, University Hassan II, Faculty of sciences, Ain chok, P.O Box 5366 Maarif, Casablanca, Morocco [email protected] 2 Network and Management Laboratory, Federal University of Santa Catarina , Caixa Postal 476, 88040-970 Florianópolis –SC – Brazil {caceres, wagner, westphal}@lrg.ufsc.br

Abstract. TINA (Telecommunications Information Networking Architecture) concepts and principles are introduced with the objective of correcting problems of centralized service control and service data model existing in IN (Intelligent Network). Now, TINA has been designed with the goal to offer an universal vision of telecommunications services, it answers to the increasing needs of fast developments of news services e.g., multimedia, multi-party conferencing, etc., will need to be rapidly and efficiently introduced, deployed, operated and managed. In this context, TINA developed a comprehensive architecture for multi-service networks that support multimedia service. On the other hand, the provisioning of all the service management context functionality for TINA services (i.e. FCAPS) is still an open research question. In this paper, we discuss accounting features and requirements, security services for TINA management context. We propose and implement a model of accouniting and security management middleware architecture. A prototype uses the environment CORBA object and JAVA to validate the concepts.

1

Introduction

TINA might be considered an architecture that is relevant to the future and existing telecommunivcations services infrastructure (i.e. the IN). This is mainly due to one of the TINA assumptions, which is based on the presence of the DPE (Distributed Processing Environment), and CORBA (Common Object Request Broker Architecture) as a signaling infrastructure. Services in TINA are carried out as distributed applications and provided over a distributed computing environment. While the TINA Consortium has coordinated works to refine and extend the specifications to ensure internetworking with legacy systems, and explain how TINA applies to IN and answers the IN evolution challenges, the specifications concerning the management domain remain incomplete. TINA has defined the Network Resource Architecture (NRA) [1] that covers the management areas of connection, configuration, fault and accounting management. Some of these areas has been defined in great detail (e.g. connection management[2]) while some others areas have been addressed much less (e.g. fault P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 438–448, 2001 © Springer-Verlag Berlin Heidelberg 2001

Accounting Management Based Service Environment in Tina, Java and Corba

439

and accounting management architecture[3]), and some others are not yet defined at all (e.g. performance management). Security management is also not yet fully addressed in TINA. Hence, to begin with, we have been working on the framework of the TINA accounting management architecture, as one of service management areas that is an indispensable part of all the TINA services. We also discuss the relevance of the security of accounting management and how to protect the accounting information. This paper is organized in the following way: Section 2 presents a TINA overview: service architecture, service management and TINA accounting architecture. Section 3 presents the accounting management system, the main components of TINA accounting management and their features. Section 4 propose a model of security management, discusses security services, mechanisms and presents security considerations in accounting. Section 5 describes the specifications and visualization of the prototype. Finally, the conclusion is given in Section 6.

2

TINA Overview

2.1

TINA Service Architecture

TINA defines a flexible architecture which consists of several modeling concepts and specifications. As well as the service architecture[4], the main specification involves the business model [5], the computational model, and the service component specification [6].

Fig. 1. TINA Service Architecture overview. In the business model, the participants (or stakeholders) in a service are categorized into five groups according to the roles they play in the service. The roles defined within TINA are Consumer, Retailer, 3rd Party Service Provider, Connectivity Provider and Broker (Fig. 1). The Broker and 3rd Party Service Provider

440

A. Sekkaki et al.

roles have not been described in detail in TINA. The Consumer, Retailer, and Connectivity Provider roles, however, have been specified in TINA with sufficient detail, including the interfaces between them. The interface among the participants are defined as References Points. The most important reference point for service management is the Ret-Reference Point [7] defined between the Consumer and the Retailer. The service architecture also defines two types of sessions, an access and a service session. The access session is responsible for the identification and authentication of the user. It is also used to search for available services and executes the services by creating a service session. The service session is responsible for managing the current state of the service. It also creates and controls stream bindings, which are an abstract representation of end-to-end connection among applications. The functionality of the service session is defined by a number of functional groups called Feature Sets. The Feature Sets carry out various functions, such as: joining a service, inviting parties in the service session, establishing stream connectivity requirements, issuing voting, etc. Subscription subsystem and subscription information model defined in TINA allow an user to discover the new services and eventually subscribes to them. This is independent of the access technology used because the end-users require more and more flexibility, and demand the ability to activate and deactivate service subscription themselves, and alter the related profiles[8]. 2.2

TINA Service Management

Service management is a very broad discipline and it is also an important part of TINA service architecture. It involves management functions in TINA service architecture. It controls the end-to-end transactions for TINA services to provide FCAPS properties dictated by binding management contexts. There are four conceptual axes associated with service management: i. Partitioning axis: TINA is partitioned into three layers (service, resource and DPE). ii. Functional axis: is represented most notably by FCAPS functions. To support the FCAPS integrity of a service session, construct such as management context and service transaction are provided. iii. Computational axis: represents computational support for management needs. iv. Life cycle axis: represents the life cycle issues, including service life cycle management and user (consumer) life cycle management. To develop the management functions on a DPE (Distributed Processing Environment) platform, TINA uses a common object interface description language (IDL or ODL). It uses also the Network Resource Information Model (NRIM), which enables us to describe systematically the network management information using unified abstract models [9].

Accounting Management Based Service Environment in Tina, Java and Corba

2.3

441

TINA Accounting Architecture

In addition to the existing standards such as X'742 [10], TINA dedicated one document to this topic[3]. Considering TINA, a higher level concept is necessary, which maintains service management context across multi-domains (stakeholders), and separates service management from service as clearly as possible[11], and on-line charging is still a challenging problem. TINA accounting management consists of four cycles namely: Metering, Classification, Tariffing and Billing. It introduces a concept of Accounting Management Context (AcctMgmtCtxt) associated with Service Transaction (ST). The purpose of AcctMgmtCtxt is to guarantee that accountability be preserved through a set of activities of distributed objects, which constitute the service. We want to emphasize that accountability is not a property or an attribute of a single object. It is rather a set of quantities measured or calculated over a set of activities of distributed objects throughout the service. When a ST is activated by a Service Session Manager (SSM), its AcctMgmtCtxt is interpreted in accordance with its Session Component description (unit of service to be accounted) and with the tariff structure within the SSM component. Then, the SSM passes control and necessary parameters to resource or computational level mechanism such as Communication Session Manager (CSM), notification server, metering managers and service management. It can be seen that the Service Transaction (ST) concept consists of three phases: i. Set-up phase : it is a phase of negotiation between the user and the provider (e.g. Tariff structure ). The agreed schema is submitted as AcctMgmtCtxt of the ST. ii. Execution phase :The service is being offered to the user, as it was specified in the first phase. The description of information of the service session is specified as a part of AcctMgmtCtxt. iii. Wrap-up phase : The service is concluded, account record or charging information may be sent to the user at the conclusion of the transaction, if it is specified in AcctMgmtCtxt.

3

TINA Accounting Management Architecture and Components

In [12], an extension to the OSIMIS management platform through implementing the Usage Metering Function defined in the OSI functional model has been developed and validated. Our present work is the continuity of activities undertaken in our laboratory. 3.1

Architectural Model

Figure 2 shows the architectural model of accounting management context with the interaction between the main components of TINA service architecture. Components are interpreted here as the units of reuse. TINA AcctMgmtCtxt consists of separate components, covering different aspects of service, and network control and management.

442

A. Sekkaki et al.

Accountable Event Collecting : The Accountable Events Collecting component receives, collects and collates the accounting events associated with the Session Components status or Session Component state changes, and events associated with charging information generated by the SSM. It is divided into two modules: EventManagememt and SessionComponent. Tariffing:Tariffing component in TINA AcctMgmtCtxt can be represented by two different modules: i. Recovery Module, which gives charging-rate as a function of the current Session State. It converts the collected accountable events to a charging record and stores it in the charging record database. In addition, it allows the restoration of the information collected when failure in the service. ii. Tariff Module, which gives accumulated current charges as a function of a sequence event. It calculates the tariff, using the charging formula according to the contract of subscription and stores it into the billing record. Billing : The billing component may be automatically issued at the end of a billing period as negotiated and defined in the customer's contract. It generates the bill based on charging information from billing records. There are four billing configuration :On-line charging, Shared billing, Third-party billing, and Credit-debit billing. The billing implementation in our prototype is configured in the on-line charging. Usage Metering: During the life time of the connection, the usage metering component collects and controls data acquisition concerned with the use of network resources generated by the LNC (Layer Network Coordinator). It also registers the collected data for future processing (fault and performance management). Security Base Server SB S

C on sum e r

R etailer UA

PA SS M U AP

S I

SU B

S ecu rity Inte rcep to r (S I)

C .O. Tariffing

C .O. Billing

C .O. Accountable Events Collecting

C SM

A cctM gm tC txt A ccoun table E ve nts C o llecting

CC

C .O. U sage M etering

LN C

M eterin g

C o nn ectivity P rovid er

CC- Connection Coordinator CSM - Communication Session Manager LNC - Layer Network Coordinator PA - Provider Agent SI - Security Interceptor

SBS – Security Base Server SSM – Service Session Manager SUB – Subscription Management Component UA - User Agent UAP - User Application

Fig. 2. Architectural model.

Accounting Management Based Service Environment in Tina, Java and Corba

3.2

443

Definition the AcctMgmtCtxt Components

The model implementation uses the CORBA objects on Visibroker 3.04 [13]. The objects are defined such as interfaces in IDL, so they can access and be accessed by any other CORBA object independently of the programming language and underlying computing platforms used [14]. The definitions in IDL of the AccMgmtCtxt components are defined in Figure 3. The building of an IDL for implementation the prototype allows the creation of the interfaces that communicate between them. The data-bases defined in IDL are divided: "SubscripInfo.mdb" which defines the subscription user, the "TariffInfo.mdb" which registers the events of Tariffing component while the service execution is carried out, and "BillingInfo.mdb" which defines the charging-billing of the user. The module AcctMgmtCtxt is the most important component in this class, it is generated in the set-up phase of the ST and it is destroyed when the Service Transaction is concluded. The interface SessionComponent is used for controlling and managing the SC (Session Component), as also start and stop metering actions in the accounting object. The SC refers one service to the specified user. EventManagement defines the events management parts (for example: delivery). In the prototype implementation, one session is used to test the service session: the "digital video-audio conference" between the users and a provider. The components forming parts of the session are extended to generate accountable events towards the AcctMgmtCtxt components and allow to each consumer to retrieve on-line billing information about an ongoing shared service session. In the beginning of the execution, a graphical interface ”Client” is visualized (see Fig. 5 in Sect. 5.1), subdivided into the following modules:

m odule AccM gm tC txt { struct S ubscInfo { } struct Ta riffInfo { } struct B illingInfo { } interfac e SessionCo m ponent { } interfac e EventM an ag em ent { } interfac e Ta riff { } interfac e Reco very { } interfac e Billing { } }

A cctM g m tC txt B illin g Billing R eco rd

DB

Ta riffing Ta riff R e co v e ry U sag e R ecord

A cco u n tab le E v e n ts C o lle tin g E ve n tM a n a g e m e n t S e ssio n C o m po n e n t

Fig. 3. Definition the AcctMgmtCtxt components.

DB

444

A. Sekkaki et al.

-

4

Subscription: login as a known user: authentication and verification of the user features; and display data user; Up-date Subscribed: up-date of user:(Insert, Modify, Delete, etc..); Monitoring service: display the video conference service for each user; and Error messages: show the errors.

Security of TINA Accounting Management

In distributed systems, security is an essential and a natural part of it. Of course accounting is not an exception. Security of accounting implies: guaranteed accountability, trustful accounting, integrity of accounting information, etc. i. Guaranteed accountability refers to the service transaction that should ideally offer a mechanism to guarantee integrity of the service. This means that “ you do not pay if you do not get the agreed service”. ii. Trustful accounting means that accounting information should be assured. The requirement come from the openness of TINA. An user and a server provider which are totally unknown to each other can connect by using an on-line Yellow Page or by using a trader (situation where security mechanism is urgently needed). How can user trust the service provider and conversely how can a service provider trust the user? The first question is related more to accounting management whereas the second is related more to security management. It is similar to the case where an unknown phone company sends an expensive bill based on questionable service usage. Openness is not necessarily a good thing unless both the user and the service provider are properly protected. Accounting information should be trustworthy and should be able to be recorded on both sides in a nonmodifiable and non-refutable manner. iii. Integrity of accounting information refers that integrity of accounting information should be preserved over network failures and over disruption of services, considering the service through over different management domains. In our system, the security functions are performed by the SBS (Security Base Server), (see Fig. 4) [15]. It provides an authentication service, a ticket distribution, an access control and a SMIB (Security Management Information Base). These services are implemented by CORBA objects. When a principal invokes a service on a server object, there is a request and a reply interacted between them. This provides security services, secure objects having security functionality using the Security Interceptor(SI) module to intercept the request and the reply. The mechanism is transparent to the principal. Most of the security functions are performed by the Security Base Server during the invocation of the target object. In our model, the SBS acts as a Security Manager. It controls and manages the security context of the interactions between the consumer and the retailer. The Security Interceptor (SI) is a security agent factory that helps in the access control of the service in the retailer domain, including the AcctMgmtCtxt.

Accounting Management Based Service Environment in Tina, Java and Corba

C onsum er A uthentication

Security B ase Server

445

R etailer A cctM gm tC txt

Security M anagem ent Inform ation Base

S M IB

PA

UAP

Ticket D istribution

A ccess C ontrol

S ecurity Interceptor

Fig. 4. Architecture of the Security Base Server. Figure 2 illustrates a relation between the model (SBS) with AcctMgmntCtxt, the components are seen by the SBS as services objects. Then they need secure transactions. The SI present in the Retailer domain will intercept invocation to AcctMgmtCtxt and provide security.

5

Description and Visualization of the Results

5.1 Description Mechanism The prototype is divided into two phases: subscription phase and monitoring phase. a) Subscription phase The prototype begins a service when it is solicited from user (module Service, click button "Start" in Fig. 5) that registers his log, entering his Id and password (module Subscription in Fig. 5). Immediately, a verification (access to database "SubscripInfo.mdb") and an authentication are carried out through the security management (SBS in Fig. 4). The authorized user presents himself under two types: 1. the user client which has a contract with provider and priority of full service uses: audio (speaking-listening) , video (vision-image), i.e. A+V; 2. the user, who uses the service for the first time, and does not have a contract with provider, gets only a partial service and he is seen as an Audio participant. The new user will be registered in database (module UpDate: “Add New User” in Fig. 5) to ensure that his amount of available credit is enough to make use of the service or in another way, giving a logout, not permitting the use of the service. Notice that the security mechanism is present during a session processing. All requests destined to the provider are transparently intercepted by the Security Interceptor (SI) that redirects it to SBS (see Fig. 4), making possible the principal

446

A. Sekkaki et al.

authorization by checking his identity and rights in SMIB. Data exchanged will be encrypted and it will guarantee security in DPE like TINA [15]. b) Monitoring phase - For each user authorized, the proper AcctMgmtCtxt is created, starting service (module Service, click button “Enter” in Fig. 5). - Automatically, the AcctMgmtCtxt creates the objects (interface SessionComponent and interface EventManagement) that identify the management events during the execution. - At the same time, a Session State Vector is generated (SSVec) where each position registers the information relating the events of service: - (1): initial time (it); (2): time time (ft); (3): accumulated time “full service use”: A+V (fs) or “partial service use”: (ps); and (4): accumulated time “shared service use” of the users (ts). - Click on button "Enter", the "it" is initialized while activating "fs" or "ps". The vector is seen as a dynamic and volatile structure, any failure that occurs during the service is registered as information in database. The backup is necessary to store the information (events) in the database ("TariffInfo.mdb") because its interaction with module Tariffing (interface Tariff) is periodic. - During the period of the service, the provider must be verify that the time expended for the user does not exceed 80% of the available limit. If it occurs, the provider must notifies the user and consults him if he desires to modify his available quota (module UpDate: "Change Max Amount" in Fig. 5), or logout of service (active the interface Billing for its charging). - The user that makes use of the service can leave the session (module Service, click button "Leave" in Fig. 5). In this moment, the user is in the state auditing (A). He has also the option to retake to the service (module Service, click button "Enter" in Fig. 5) or end of session (module Service, click button "Stop" in Fig. 5). - The option also exists for several users to share the service at the same time. This happens when the button "Enter" is activated and then it actives "ts" and stop "fs". To leave the shared state, click button "Leave" to active "fs" or "Stop" to quit. - If the user is in the state "Stop", the timers are deactivated, and "ft" is registered. Finally, the on-line charging (interface Billing) is activated for the supplied service of the user and the information is stored in database ("BillingInfo.mdb").

5.2 Scenario Execution We consider in Figure 5 three users who share the same session of "multi-party conferencing service" provided by the retailer. Each user in the execution of the service has its proper graphical interface "Client", that defines the Accounting Management Context, which allows the management of the available resources in the session to start.

Accounting Management Based Service Environment in Tina, Java and Corba

447

Fig. 5. Example of scenario When the session is finished, the graphical interface "Billing" is displayed, that shows the on-line charging of the service supplied for the Retailer. The users have three options of access to the service according to their contracts: V (Video+Audio), A (Audio) and S (Video+Audio Shared). The use of the "V option" costs 3$/unit, the "A option" costs 1$/unit and the "S option" costs 2$/unit.

6

Conclusion

CORBA facilities and services offer a set of interface that supports TINA service management. This paper provides first a brief overview of the TINA concept an the focuses on accounting management. We described accounting features, requirements, and other accounting issues. Then, we proposed an accounting management architecture specifying an architectural model which contains components such as

448

A. Sekkaki et al.

AcctMgmtCtxt, Session Component, etc., covering different aspects of service control and management. We also integrated security in TINA accounting management through, security services and mechanisms, based on secure objects. In order to realize our model, we described the accounting components in IDL, their roles and their interactions to accomplish the accounting functionality. We illustrated a prototype in TINA-based service environment considering on-line billing.

References 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11.

12. 13. 14. 15.

Steegmans, F. (ed.): TINA Network Resource Architecture. TINA-C, http://www.tinac.com, 1997. Pavlou, G., Mota, T., Steegmans, F., Pavon, J.: Issues in Realizing the TINA Network Resource Architecture. In: Interoperable Communication Networks Journal, Vol. 2, No. 1, pp. 133-146, Baltzer Science Publishers. March 1999. Hamada, T.: Accounting Management Architecture. TINA-C, http://www.tinac.com, 1996. Kristiansen, L. (ed): TINA Service Architecture 5.0. TINA-C, http://www.tinac.com, 1997. Yates, M., Takita, W., Demoudem, L., Jansson, R., Mulder H.: TINA Business Model and Reference Points. TINA-C, http://www.tinac.com, 1997. Abarca, C. (ed) : TINA Service Component Specification. v. 1.0b, TINA-C, http://www.tinac.com, 1998. Farley, P. (ed) : TINA Retailer Reference Point Specification. v. 1.0, TINAC, http://www.tinac.com, 1998. Pampaey, M., Couturier, A.: Using TINA Concepts for IN Evolution. In: IEEE Communication Magazine – June 2000. Steegmans, F. (ed) : TINA Network Resource Information Model. TINA-C, http://www.tinac.com, 1997. ITU-T Recommendation X.742, Information Technology – Open Systems Interconnection – Systems management: Accounting meter function- July 1994. Hellemans, P., Redmond, C., Daenen, K., Lewis, D: Accounting Management in a TINA-Based Service and Network Environment: the Sixth International Conference on Intelligence in Services and Networks , Barcelona, April 1999. Kormann, L.F., Westphall, C.B., Coser, A.: OSI Usage Metering Function for OSIMIS Management Platform. In Journal of Network and Systems Management, Vol. 4, No. 3, 1996. Visibroker 3.04 http://www.inprise.com Object Management Group. The Common Object Request Broker Architecture 2.0/IIOP – specification Revision 2.0 – OMG Document – August 1996. Sekkaki, A., Nguessan, D., Müller, M.D., Westphall, C.B.: Security within TINA Accounting Architecture Management. IEEE International Conference on Communication , June 11-15, 2001 Helsinki, Finland.

A QoS System for CaTV Networks Juan Leal and Jos´e M. Forn´es ´ Area de Ingenier´ıa Telem´ atica, Universidad de Sevilla Camino de los Descubrimientos s/n, E-41092 Sevilla {jleal, fornes}@trajano.us.es Abstract. This paper proposes an architecture for the integration of QoS enabled systems in the context of a CaTV network. The proposed architecture makes possible to use several signaling protocols, to add QoS signaling capabilities to systems that would otherwise only support static QoS provisioning and to integrate the QoS mechanisms of the different technologies used in CaTV networks. This paper also describes an implementation of the proposed architecture using Java Beans, where CORBA based signaling is used to provide on demand QoS to the Com21 cablemodem system.

1

Introduction

Recently, boosted by the growth of the Internet, the need for IP to provide Quality of Service (QoS) mechanisms has become patent in order to support new services demanded by users. In this direction, the IETF is carrying on important efforts that lead to a number of technologies, mainly Integrated Services [1], Differentiated Services [2] and Policy Based Admission Control [3]. At the same time, work is being done in the integration of IP with other technologies that support QoS, like ATM [4]. MPLS [5] is an example of this effort. In parallel, conscious of the importance of QoS, many network equipment manufacturers incorporate in their devices their own static priorization or reservation mechanisms. Putting it all together, there are a number of technologies that address the problem of QoS, and their integration is necessary to get the best out of each one of them. This work consists in the design of an architecture that integrates different QoS enabled systems in the context of a Common Antenna TV (CaTV) network [6]. CaTV networks have a number of particularities that make them interesting for this work. In the first place, they use several different technologies (cablemodem, IP, ATM...) that must be integrated. Secondly, cablemodem access systems support QoS at a MAC level but at the moment only provide statically configurable QoS [7,8,9,10]. Finally, they are managed by one single organization, which makes possible to use solutions that are not applicable to the whole Internet. Therefore, this paper is only addressed to CaTV networks and the solutions proposed are not applicable to the Internet. P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 449–457, 2001. c Springer-Verlag Berlin Heidelberg 2001 

450

J. Leal and J.M. Forb´es

The key benefits of this work are: providing a transient solution that allows the provision of QoS until a definitive standard is adopted; integrating in the system existing network elements which are widely deployed and whose QoS features are not being efficiently used at the moment (e.g. cablemodem systems) and integrating different existing partial solutions in order to extend QoS guarantees to the highest number of systems possible, in the CaTV environment. A testbed of the proposed architecture has been implemented and tested on a real CaTV network. at the moment, the system operates only on the Com21 [8] cablemodem system and receives subscribers’ signaling through a CORBA [11] interface. The remainder of this article is organized as follows. Section 2 introduces CaTV from the data transmission point of view and cablemodem systems. Section 3 explains the proposed architecture for the integration of QoS technologies in CaTV networks. Later, Section 4 describes the implemented testbed and finally conclussion remarks are given in Section 5.

2

Introduction to CaTV Networks

Bi-directional CaTV networks based on the Hybrid Fiber Coaxial (HFC) technology [12] consist of a number of so called Primary Nodes linked together and to the network’s Headend through an IP backbone supported on a WAN network such as SDH or ATM. The Primary Nodes are also connected to HFC networks that reach the subscribers’ homes. The network’s Headend contains other important network elements such as the web and mail servers, the O&M segment and the Internet connection. The cablemodem system consists of the subscriber access devices, called cablemodems, and a number of CableModem Termination Systems (CMTS), located at the Primary Nodes, which control the cablemodems and forward their traffic through de HFC network to the cable operator’s network and vice versa. An O&M workstation installed in the Headend manages the cablemodem system. There are several cablemodem systems. Motorola’s and Com21’s are among the most deployed proprietary systems [13]. The Cable Television Laboratories (CableLabs) has defined a standard and interoperable cablemodem system called Data Over Cable Service Interface Specifications (DOCSIS) [9,10]. Current version is 1.0 and version 1.1 is in process of specification (interim status).

3

Proposed Architecture

The IP QoS technologies in use nowadays [1,2] use a decentralized paradigm, where each network element receives in-band signaling (that is, signaling packets follow the same route as data packets) and takes the appropriate actions to fulfill the QoS requests. This is obviously the best solution to provide end to end QoS in a context of different networks managed by different administrators, and is consistent with Internet’s philosophy.

A QoS System for CaTV Networks

451

However, in the context of CaTV we are interested in adding QoS signaling to elements, such as cablemodem systems, which currently have only static QoS mechanisms. In order to do this, because we can not modify existing network elements, we need a centralized element that receives out-of-band signaling and modifies the otherwise statically assigned QoS in these elements. It is evident that a centralized QoS architecture is not convenient for the Internet and that it has important drawbacks, mainly related to scalability. However, in the context of CaTV networks, which are managed by an unique administration, this is not a problem. All the contrary, because of the diversity of technologies used (cablemodems, ATM, routers, SDH...), a centralized structure can be the most efficient manner to achieve the integration of the different QoS mechanisms used in these technologies. Therefore, this paper proposes a centralized QoS architecture for achieving end to end QoS in CaTV networks by means of efficiently integrating the different QoS technologies used in this networks and adding QoS signaling to elements that do not support it. The primary element of this architecture, shown in figure 1, is a QoS server that would likely be located at the network Headend, connected to both the backbone and the O&M network. CMTS cablemodem

1 0

HFC O&M

cablemodem

0 1 1 0

QoS Server

CMTS

Backbone

Internet

HFC

cablemodem

3.1

Fig. 1. Centralized architecture

Server Architecture

The architecture for Integrated Services in the Internet [1] is a decentralized one where every router receives in-band QoS signaling, performs admission control and modifies the forwarding of the packets accordingly. The reference model for Integrated Services routers is shown simplified in figure 2. The reservation setup agent receives user’s QoS signaling, checks admission control to decide whether the request should be granted and modifies the forwarding behavior accordingly. The proposed centralized architecture is based on a server with an internal architecture which is a generalization of this reference model. Changes have

452

J. Leal and J.M. Forb´es

Reservation Setup Protocol

Reservation Setup Agent Admission Control

User’s Traffic

User’s Forwarding Path

Traffic

Fig. 2. Reference model for routers defined in RFC 1633

been made in order to manage the different elements of the CaTV network and support several QoS signaling protocols. As it has been explained, IP QoS signaling protocols used at the moment, remarkably RSVP [14], are in-band protocols, which are not suitable for a centralized architecture. Therefore, a different protocol has to be used. In order to be able to use different signaling protocols until there is a standard one, it is desirable that the architecture allows support for several signaling protocols simultaneously. For this purpose, instead of a single reservation setup agent, the proposed architecture can contain several modules (which we call “agents”), each of which implements a QoS signaling protocol. The equivalent in the proposed architecture of the forwarding path in the router reference model are a number of components called “managers”. Because the server is centralized and does not forward user’s traffic, a forwarding path makes no sense. Instead, the server must take the appropriate actions on the managed devices in order to provide the requested QoS. Therefore managers act as proxies of network elements performing, with respect to agents, the same functions as the forwarding path. Finally, admission control functions are divided in two different blocks. Admission control based on resource availability is dependent of the network element and must be therefore performed by managers. However, policy based admission control (that is, administrative authorization) is better done in a centralized way and is therefore implemented in an ”authorization component” in the server. The rest of functions performed by the server, like initialization, logging and accounting are implemented by other components of the server which we refer to as “Auxiliary Elements”. This architecture, depicted in figure 3, allows the integration of the different technologies in a CaTV network from a centralized server, with an structure similar to the router reference model but generalized and adapted to a centralized

A QoS System for CaTV Networks

453

User’s Signaling

CORBA Agent

RSVP Agent

[...]

Propietary Protocol Agent

Accounting System

O&M Interface

Authorization System

ATM Manager

Com21 Manager

[...]

DOCSIS Manager

QoS Provisioning

Fig. 3. Server architecture

system. Using this architecture, the server can receive user’s QoS signaling using several protocols and can reserve the requested QoS in all of the network elements of a CaTV network.

4

Testbed

The proposed architecture has been implemented and the resulting system has been tested on the HFC network of Supercable Andaluc´ıa, the cable operator of southern Spain. A testbed consisting of one dedicated Com21 CMTS, one management workstation, four cablemodems, one PC acting as QoS server and two multimedia client PCs was employed. The testbed also used the operator’s SDH backbone and a private portion of the real HFC network. 4.1

Server Implementation

The principal design issue for the centralized QoS server is upgradability, in order to support new network elements and signaling protocols. Consequently, an architecture based on Java and the Java Beans [15] conventions is proposed. Thanks to using out-of-band signaling, the server does not suffer the load of forwarding users’ traffic. Therefore, the main shortcoming of Java, performance, is not a central issue for the server. In fact, as will be proven later, server’s processing time is a minimal part of the overall response time of the system.

454

J. Leal and J.M. Forb´es

The server components described in the proposed architecture are implemented as Java Beans and the communication among them is performed through Java events. The purpose of this architecture is that new Agents, Managers and Auxiliary Elements can be implemented when required and incorporated to the server simply by linking its events to the rest of the components of the server, which can be done in a graphical Integrated Development Environment. User

Agent

Auth Bean

Accounting

Manager

Devices

(1) (2) (3) (4) (5) (6) (7)

(8)

(9) (10) (12)

(11)

(13)

Fig. 4. Processing of a QoS request

A typical QoS request from a user is processed as shown in figure 4. First of all, the request is received by the agent that implements the signaling protocol used (1). This agent decodes the request and translates it to a common format understood by the rest of components in the server. Then the agent sends an authorization request event to the registered authorization beans (2). If no exception is raised, meaning authorization is granted, the agent issues reservation request events to all of the managers and waits for their responses (3). Each manager then tries to fulfill the request performing the necessary operations on the network elements that it manages (4). Three possible results can be returned by each manager to the originating agent, OK in case the request

A QoS System for CaTV Networks

455

is successfully completed, NOK if an error occurred (for example due to lack of resources) and IGNORE if the managed network elements are not related to the request. Upon receiving all of the responses (5), the agent calculates the aggregate result (typically failure if at least one NOK is returned and success otherwise) and returns it to the requesting user (6). The agent is also responsible for maintaining any necessary state information on the request, possibly exchanging keepalive messages with the user (7), and the managers must ensure the reservation remains active on the managed devices (8) . When the reservation is torn down by the user (9), the agent sends cancellation events to the appropriate managers (10), which are responsible for terminating the reservation (11), so no confirmation is necessary. Finally, the agent sends a Call Detail Record (CDR) event to the accounting beans (12) and reports the result to the user (13). 4.2

Implemented Components

At the moment, only one agent that uses CORBA [11] for signaling and one manager for the Com21 cablemodem system have been developed. Also, in order to test the system, a videoconference application has been used. The agent implements a CORBA interface to communicate with users. This interface consists of one object containing methods for users to make, release and maintain QoS reservations. The choice of CORBA for signaling is based on simplicity: instead of designing a completely new protocol, it was considered easier to use CORBA, which relieved us from the communication and platform interoperability issues. Although CORBA would definitely not suit for an inband protocol, being the server centralized it appeared as a good alternative. Even performance could be argued against CORBA, the tests of the implemented QoS Server, described later in this paper, showed CORBA’s overhead was not a concern. The implemented manager performs the necessary SNMP [16] operations on the Com21 cablemodem system’s CMTSs in order to modify the otherwise statically assigned QoS of the cablemodems. When this manager receives a request from an agent, it searches the affected cablemodems through all the CMTSs owned by the cable operator and temporarily modifies its QoS level, changing it back when the reservation ends. The auxiliary elements are very simple in this early stage of development. The O&M bean starts and shuts down the server. The authorization bean always grants the requests. The accounting bean writes a CDR to disk. VoIP and videoconference are some of the main applications that benefit QoS. They have therefore been chosen for demonstration and testing of the system. For this purpose, an application that performs QoS signaling on behalf of Microsoft NetMeeting has been developed.

456

J. Leal and J.M. Forb´es

4.3

Performance Results

The results of the tests were satisfactory in that the QoS level of the pertinent cablemodems was actually modified and the clients were able to perform a QoS enhanced videoconference. The performance measurements showed that the maximum number of requests per minute that the system could serve without congestion was around 40, and was mainly limited by the response time of the CMTS to the SNMP operations. In fact, the response time of the server excluding the SNMP operations was about 90 ms. which allows to estimate the maximum load in over 600 requests per minute. This also proves the hypothesis that Java and CORBA performance issues were not a concern.

5

Future Work and Conclussions

Strictly speaking, to provide QoS end to end, it has to be supported in all of the elements in the path between the end hosts. Therefore, the final objective of this work is to interface with all the necessary systems in order to offer end to end QoS guarantees. For this purpose, it will be necessary to develop new managers for other devices. New agents that implement other signaling protocols will be needed to interface with the clients. Also, as described above, for the system to be useful in the practice, authorization and accounting beans that interface to policy and billing systems are necessary. At this moment, this work allows to provide on-demand QoS over Com21 cablemodem systems by means of a custom CORBA interface. Assuming the operator’s backbone is sufficiently overprovisioned, the system allows to maintain high quality VoIP calls and videoconferences between cable subscribers. Presently, we are studying how to interface the system with the new DOCSIS 1.1 cablemodem platform.

References 1. IETF RFC 1633. Integrated Services in the Internet Architecture: an Overview (6-1994) 2. IETF RFC 2475. An Architecture for Differentiated Services (12-1998) 3. IETF RFC 2753. A Framework for Policy-based Admission Control (1-2000) 4. Eichler, G., et al.: Implementing Integrated and Differentiated Services for the Internet with ATM Networks: A Practical Approach. IEEE Communications Magazine. Vol 38-1 (2000) 5. IETF RFC 3031. Multiprotocol Label Switching Architecture (1-2001) 6. Ciciora, W.: Cable Television in the United States. An Overview. Cablelabs (1995) 7. Rabbat, R., Siu, K.: QoS Support for Integrated Services over CaTV. IEEE Communications Magazine. Vol. 37-1 (1999) 8. Com21 Inc.: ComUNITY Access System - 2.3 Release - Technical Reference Manual (1998) 9. Cablelabs: Data-Over-Cable Service Interface Specifications. Radio Frecuency Interface Specification. Version 1.1, revision I05 (7-2000)

A QoS System for CaTV Networks

457

10. Fellows, D., Jones, D. DOCSIS Cablemodem Technology. IEEE Communications Magazine. Vol. 39-3 (2001) 11. Object Management Group (OMG): The Common Object Request Broker: Architecture and Specification, Revision 2.2 (2-1998) 12. Bisdikian, C., Maruyama, K. Seidman, D., Serpanos, D.: Cable Access Beyond the Hype: On Residential Broadband Data Services over HFC Networks. IEEE Communications Magazine. Vol. 34-11 (1996) 13. www.cable-modems.org/articles/market 14. IETF RFC 2205. Resource ReSerVation Protocol (RSVP) (9-1997) 15. Sun Microsystems: The JavaBeans API Specification (7-1997) 16. IETF RFC 1157. Simple Network Management Protocol (SNMP) (5-1990)

Towards Manageable Mobile Agent Infrastructures Paulo Sim˜ oes, Paulo Marques, Luis Silva, Jo˜ ao Silva, and Fernando Boavida CISUC, University of Coimbra Dep. Eng. Inform´ atica, P´ olo II P-3030 Coimbra, Portugal {psimoes}@dei.uc.pt

Abstract. This paper addresses the problem of managing distributed mobile agent infrastructures. First, the weaknesses of current mobile agent implementations will be discussed and identified from the manageability viewpoint. The solutions devised and experimented in order to alleviate these weaknesses in our own agent platform will then be presented. These solutions are generic and could easily be applied to the majority of existing mobile agent implementations. The paper will finish with the discussion of a new approach we are following in the M&M Project, based on a rather different architecture that significantly reduces the manageability requirements.

1

Introduction

A mobile agent (MA) is a software program that is able to migrate to some remote machine, where it is able to execute some function or collect some relevant data and then migrate to other machines in order to accomplish another task. The basic idea of this paradigm is to distribute the processing throughout the network: that is, send the code to the data instead of bringing the data to the code. MA systems differ from other mobile code and agent-based technologies because increased code and state mobility allow for even more flexible and dynamic solutions. Telecommunication applications and network management are part of the broad range of application fields for MA systems [1]. Mobile agent implementations are based on some kind of distributed supporting infrastructure, that provides the execution environment for the agents in each location, controls the agent migration and lifecycle, and usually delivers additional services such as security and multi-agent coordination. This infrastructure typically consists of mobile agent platforms designed as extensions of the host’s operating system. Each network node hosts one platform where agents from different applications and different users coexist and (hopefully) cooperate with each other. One of the problems with current mobile agent systems is the considerable overhead required to properly install, configure and manage this large, distributed and remote infrastructure. This overhead often counterbalances the advantages of applying mobile agents in the first place, and seriously affects the P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 458–467, 2001. c Springer-Verlag Berlin Heidelberg 2001 

Towards Manageable Mobile Agent Infrastructures

459

usability of MA technology. For this reason, effective infrastructure management solutions are crucial for the success of mobile agent systems.

2

Agent Management and Infrastructure Administration

Manageability of mobile agent systems includes two distinct domains: the mobile agents themselves, and the supporting infrastructure. Agent management is by now fairly well covered. Almost every known MA implementation allows adequate control of the agent lifecycle, the agent location, inter-agent coordination, migration and security. Although current implementations rely on proprietary and internal mechanisms, ongoing standardization initiatives - like MASIF [2] and, to some extension, FIPA [3] - are expected to provide the desired means of interoperability, as more implementations start to comply with these standards. The management of the supporting distributed infrastructure, on the other way, is usually considered as a side-problem not directly related with MA technology and, therefore, not deserving the same level of attention. Although this might be so for small-scale prototypes, when one tries to deploy real world distributed MA platforms, the costs of installation and administration easily rise to unacceptable levels. In the last couple of years we have developed the JAMES platform for mobile agents [4,5], which was later used by our industrial partners to produce and deploy several MA-based applications for telecommunications and network management. This scenario provided us with a good perspective on infrastructure manageability. Three key problems were identified in current systems: (i) they are too much focused on mobile agents; (ii) they do not decouple the management functionality from the infrastructure itself; and (iii) they lack effective support for remote maintenance of geographically distributed platforms. The excessive focus on mobile agents results in the assumption that applications are 100% based on mobile agents. However, most applications should be composed by a mix of “static” modules (user interfaces, databases, system specific modules, etc.) and, just where appropriate, specialized mobile agents. This excessive focus on the MA technology, instead of the overall MA-based application, leads to a general lack of clear and powerful interfaces between the mobile agent infrastructure, the agents and the “static” components of agent-based applications. This results either in complicated and inefficient ad-hoc interfaces between the agents and the applications and in unbalanced application design, with more and more functionality pushed into mobile agents just because there is no easy way to interface with external modules. The lack of decoupling between the management functionality and the platform itself is the second major drawback with current systems. Although they already entail some kind of global infrastructure management, with basic monitoring and control, this functionality is hidden in the platform internals and, at most, only available through closely attached user interfaces. General-purpose

460

P. Sim˜ oes et al.

management applications are thus unable to integrate the management of MA infrastructures into its global system management framework. The remote management factor is also an important but overlooked issue. One of the key advantages of MA systems is the ability to dynamically upgrade remote services installed on mobile agents. However, this advantage is dependent on the robustness of the underlying agent platform, which demands support for remote operations like installation, upgrading, monitoring, rejuvenation and tuning. With few exceptions, current platforms do not provide such services and require either local installation and maintenance (with increased running costs) or the usage of general remote desktop applications like Microsoft’s Systems Management Server or Intel’s Landesk, with increased complexity and poor integration.

3

Platform Manageability in the JAMES Project

In order to tackle with these key issues, three simple but effective solutions were introduced in the JAMES platform: a low-level service for remote upgrade and control of MA platforms; a high-level API for external applications interfacing with the platform or the platform’s mobile agents; and an SNMP service that allows legacy management applications to monitor and administer the MA infrastructure. Fig. 1 shows the integration of these three solutions into the JAMES framework. Their implementation uses very simple and pragmatic approaches, and other MA systems should also be able to support this management model without requiring major system redesign.

Systems Manager

Users

Dedicated JAMES management

Applications using MA technology Application X (static modules)

Integrated systems management

Remote API

SNMP

SNMP service for integrated management of the JAMES Platform

Remote API

SNMP

JAMES Agency B

jrexec

jrexec

Host A

Remote API

SNMP

Agents of Application Y

Agents of Application X JAMES Agency A

Legacy SNMP-based management system

Appl. Y

Service for infraestructure management and control of agent lifecycle

jrexec

Remote low-level maintenance of agencies

Management Application (aware of the Remote API)

Systems Manager

...

JAMES Agency n

...

Host B

Fig. 1. JAMES Threefold Support for Platform Management

jrexec

Host n

Towards Manageable Mobile Agent Infrastructures

3.1

461

Low-Level Management of Remote Agent Platforms

The lower level of management for remote agent platforms (i.e. agencies) is provided by jrexec, a small and very stable service that runs at the host operating system level and controls the execution of the MA platform providing several services from remote locations: agency start and stop, agency rejuvenation, agency monitoring and upgrade of the agency software. This service represents a hook that avoids expensive local interventions, even in the case of unexpected MA platform crashes. The installation and operation of jrexec is dependent of the host’s operating system. It might be installed, for instance, as an Windows NT service or a Unix daemon. However, the interface to the management services provided by the several versions of jrexec is homogeneous, resulting in uniform MA infrastructure management across heterogenous networks. Since it is even possible to run the agencies without jrexec (relying in general-purpose remote management tools or using local interventions whenever necessary) the portability of the JAMES platform is not affected. 3.2

Remote Interface for External Applications

JAMES includes a single unified interface for communication between the mobile agent system and external applications. The implications of this interface, that we name Remote API, are manifold: – the core of the platform became much simpler. Several user interfaces for basic operations and maintenance tasks (system monitoring, agent lifecycle control, system maintenance), previously attached to the platform’s core, were pushed to the outside and redesigned as standalone applications that interact with the platform using the Remote API. In fact the current version of the platform has no graphical user interface at all; – interaction between mobile agents and its associated “static” modules (applications) was enhanced. Each application directly launches, controls and communicates with its agents in a straightforward fashion. This simplifies the application design and allows more efficient usage of agent technology; – and MA technology can be totally hidden bellow MA-based applications that, through the Remote API, completely control and make use of JAMES without requiring direct contact between the user (i.e. the customer) and MA related technology. This opens the way for deployment of MA-based applications into mainstream markets. The current implementation of the Remote API is based on Java RMI, and consists on the interface itself, on the side of platform, and a set of Java classes to be included on the external applications (Fig. 2). These classes provide to the application developer with a high-level interface to the agent infrastructure, either to control/access their own agents or to manage the whole infrastructure. The administrative model of the Remote API considers several types of entities: Applications, Application Licenses, Users, Mobile Agents, Instances of

Applications Proxy

JAMES infrastructure and mobile agents

Java RMI Corba ...

Event Dispatcher

Communication Module

Management Modules

Communication Module

Internal API for Administration

Users Proxy

Agents Administration Proxy Agents Monitoring Proxy

Agencies Proxy

External Application (specific code & libraries)

P. Sim˜ oes et al.

Stubs implementation

462

Fig. 2. Structure of the Remote API

Mobile Agents and Agencies (Fig. 3). With this model it is possible to support coexistence of multiple applications and multiple users in a flexible manner. A detailed security framework also allows the flexible definition of the permissions of each entity. It should be noted that the Remote API imposes no clear distinction between infrastructure management and common usage of mobile agents. The role played by each external application connected to the JAMES platform only depends of its security permissions and the context of each request. The

Application X

Application Y

Application Z

License X.a User X.a.1 User UserX.a.1 X.a.1

Agent X.a.k Agent AgentX.a.k X.a.k

Agency C Agency B

User X.a.1

Instância do Instância do Agent Instance Agente X.a.j Agente X.a.j X.a.1.k

Agency A

Agente X.a.k Agente X.a.k X.a.1 License Instance

Fig. 3. Administrative Model of the Remote API

Remote API presents some similarities with MASIF [2], a CORBA-based interface proposed by OMG as a standard for interoperability between different mobile agent systems. However, while MASIF focus on the mobile agent lifecycle, providing services for agent instantiation, control and monitoring, the Remote

Towards Manageable Mobile Agent Infrastructures

463

API also addresses the infrastructure management, including a more elaborate administrative model and also encompassing the maintenance of the agencies. The Remote API could probably be designed as an extension of MASIF, since its functionality is a superset of the functionality covered by MASIF. However, this decision would imply the simplification of the JAMES administrative model (in order to comply with the model of MASIF) without major interoperability gains, since the acceptance of MASIF is still reduced. 3.3

Platform Management from Legacy Applications

The third management service included in the JAMES platform is motivated by the desire to provide integration between MA systems and legacy management applications based in architectures like SNMP [6]. With this goal in mind a subset of the functionality provided by the Remote API was ”translated” into an SNMP MIB (see Fig. 4) and made available through an AgentX-based extensible agent [7]. In this way the mobile agent infrastructure can be treated by general-purpose legacy management platforms like any other component of the whole system. It should be noted, however, that due to the intrinsic limitations of the SNMP framework this service does not provide the same level of functionality as the Remote API, with its rich programming model and detailed security framework. Instead, the JAMES-MIB acts as a complement directed to legacy management applications that can not be converted to use the Remote API.

JAMES-MIB [OID 1.3.6.1.4.1.1331.10] Agencies

Applications

Mobile Agent Instances

Agency Agency Agency Agency Agency Agency Agency Agency (other

Appl. Appl. Appl. Appl.

Agent Name Agent AssociatedLicense Instance Age Agency of Instance Creation Instance Current Agency Instance Currente State Instance Id

Name IpAddress ListenPorts State LastStateChange RegistryAge Owner Permissions monitoring data...)

Name Description Owner Registry Age

Users Username Login Description License

License Instances License Name License Key Instance Description Instance Age Instance State

Registered Licenses License Name License Key Associated Application License Registry Age

Registered Mobile Agents Agent Name Agent Size Agent Type Associated Application Agent Version Agent Version Age Agent Default Lifetime Agent Associated License Agent Registry Age

Fig. 4. Main Components of the JAMES-MIB

464

4

P. Sim˜ oes et al.

One Step Further: Maintenance of Application-Centric Mobile Agents

As already mentioned, the solutions devised for the JAMES platform tackle with some of the identified problems with the maintenance of MA systems simply by adding ad-hoc management support to an already established architecture, common to most MA implementations. In the context of the M&M project [8] we are now working on a new architecture for mobile agent support. The most distinctive characteristic is that in this new approach there are no agent platforms. Instead, agents arrive and leave from the applications they are part of. The application is central and MAs are just a part of the system playing specific roles (see Fig. 5). The applications are able of sending, receiving and interacting with mobile agents by using well-defined binary software components (Javabeans or ActiveX components). Management applications are developed using the current industry best-practice software methods and can become agent-enabled by integrating mobility components. There is one small component that provides the basic support for mobile agents (migration, lifecycle control) and, using a flexible extension mechanism, more sophisticated services (agent coordination and communication, agent tracking, security, persistence, infrastructure management, etc.) are added as components, if and where needed.

Application Centric Mobile Agent Systems

User Interface

Generic components Applicationspecific components

Application Z

Application Z Mobility related components

Mobilityrelated components

Appl. Y

Appl. Y Mobility related components

Mobility related components

Host A

Host B

Fig. 5. The M&M Architecture for Application Centric Mobile Agents

A more detailed description of this novel perspective on mobile agents, that brings potential advantages in several fields, is presented in [9,10]. From a strict manageability viewpoint, the key differences are: – there is no agent platform to install and maintain. Although there are still distributed applications to install and manage, this is much simpler than managing a separate infrastructure shared by a large number of distributed applications with different policies and requirements;

Towards Manageable Mobile Agent Infrastructures

465

– agents interact directly with the applications from the inside. This eliminates the need to set up interface agents and configure and manage its security policies. This also partially eliminates the need for mechanisms like the Remote API; – for each application only the required components (including even the management services) are installed, resulting in a simpler and lighter framework to manage. This framework results, therefore, in a significant reduction on the specific infrastructure management requirements and in a shift towards the use of more generic application management tools. The manageability problem becomes less complex and more generic. Nevertheless, some agent and infrastructure management services are available in the form of extension service components. These services provide an additional service layer for managing the agent support components, available both from within the agent-enabled application and from external applications (see Fig. 6). Available functionality includes agent management (instantiation, monitoring, shutdown, etc.) and mobility component control (start/shutdown, monitoring, configuration, resource management, etc.). Additional services, such as agent tracking, are also available through similar service components. This architecture results in a simple but very flexible

External Management Application

Agent-enabled Application

Mobility Management Service (other services)

Service Support Events

Internal Mobility Management

Agent Lifecycle Events

Java RMI Service for Remote Management

Core Mobility Component

Mobility Management Service

Core Mobility Component

Mobility Management Service

Core Mobility Component

Fig. 6. M&M Management Architecture

framework for maintenance of the mobility-related components of the application. New interfaces (such as SNMP, Corba, WBEM or HTML) can easily be added building new components, and the management functionality can even be extended to entail the administration of the whole agent-enabled application. The implementation of the M&M framework is partially available for download at [8], including a prototype external management application for demonstration purposes.

466

P. Sim˜ oes et al.

One important point is that the component infrastructure must be manageable itself. For instance, some applications require runtime instantiation or installation of new services. The need to change certain component parameters at runtime (e.g. the maximum number of running agents, a listening port, or the logging level) is also quite common. In our case this is accomplished by having a management component service that performs several functions: – it listens for external management requests; – when a service instantiation is requested it analyses the Service Deployment Descriptor that was issued and then instantiates and configures the service. This involves close interaction with the core Mobility Component for registering the service with the appropriate configuration and security permissions; – when it receives a request to modify a component parameter it propagates the request to that component. A unique identifier distinguishes each component, and each component understands certain administration tasks. For instance, the Mobility Component has a property named listen port, which represents the port for the incoming agents. A request can be made to change the mm.mob.Mobility.listenPort property to a new value. The request first arrives at the management component, which identifies the target component and then propagates the request to that component through a callback interface; – finally, the management component also allows to broadcast a property change request to all the components. For instance, most of the components use a property called mm.mob.logLevel that determines which calls and actions must be sent to the log file. It is quite easy to request all the running components to change their log level by issuing a broadcast that will notify each of the components of the change. Despite its simplicity, this management component provides a high degree of flexibility. Its strength resides in its generality, that allows any changes to be propagated to the running components, even when those components were not known at the time of development or deployment. The management interface of each of the components is not hard-coded in a class but propagated to the components themselves. Each component includes and understands its specific set of management properties and actions. Another interesting point of the framework is that it allows the runtime deployment of new services not only using the management interface but also through administration agents. This means that an agent with the appropriate permissions has the ability to examine which components are available at a host, to modify their properties, and to change that configuration by shutting down services or instantiating new ones. This feature is especially interesting in applications where monitor agents roam through the network examining the state of the machines, quickly reacting to malfunctions (e.g. crashes, failures and environment changes) by autonomously recovering the applications.

Towards Manageable Mobile Agent Infrastructures

5

467

Conclusions

The high costs associated with the installation and administration of distributed mobile agent infrastructures are an important but often overlooked obstacle to widespread deployment of mobile agents. In this paper we present two approaches to reduce those costs. In the first approach, validated in the JAMES project, several ad-hoc solutions are added to a classic platform-based architecture, resulting in enhanced communication with external applications, integration with legacy SNMP-based management applications and remote control of the distributed infrastructure. The second approach is based on the M&M framework, where a significant change in the agent-system architecture results in much simpler management requirements. Using the M&M integration framework, a small management service component is available both for internal and external management of the agent-support components. In the future new interfaces can be added - for instance for SNMP support - and new management functionality can be provided, such as application management. Acknowledgements The M&M project is partially funded by CISUC (R&D Unit 326/97) and by FCT (Project Reference POSI/33596/CHS1999). JAMES was an Eureka Project (Reference Σ!1921) partially funded by ADI (Agˆencia de Inovac˜ ao).

References 1. Pham, V., Karmouch, A.: Mobile Software Agents: An Overview. IEEE Communications Magazine, pp. 26-37, July (1998) 2. Mobile Agent System Interoperability Facilities Specification. OMG TC Document orbos/97-10-05 (1998) 3. Foundation for Intelligent Physical Agents, http://www.fipa.org/ 4. Silva, L., Sim˜ oes, P., Soares, G., Martins, P., Batista, V., Renato, C., Almeida, L., Stohr, N.: JAMES: A Platform of Mobile Agents for the Management of Telecommunication Networks. Proceedings of IATA’99, Springer-Verlag LNCS 1699 (1999) 5. University of Coimbra, JAMES Project Homepage, http://james.dei.uc.pt/ 6. Sim˜ oes, P., Silva, L., Boavida, F.: Integrating SNMP into a Mobile Agents Infrastructure. Proceedings of DSOM’99, Springer-Verlag LNCS 1700 (1999) 7. Sim˜ oes, P., Lourenco, E., Pereira, P., Silva, L., Boavida, F.: J.AgentX: a Tool for Dynamic Deployment of Open Management Services. Proceedings of 2000 International Conference on Software, Telecommunications and Computer Networks (SoftCOM’2000), Split (2000) 8. University of Coimbra, M&M Project Homepage, http://mm.dei.uc.pt/ 9. Marques, P., Silva, L., Silva, J.: Going Beyond Mobile Agent Platforms: ComponentBased Development of Mobile Agent Systems. Proceedings of the 4th International Conference on Software Engineering and Applications (SEA’2000), Las Vegas (2000) 10. Marques, P., Sim˜ oes, P., Silva, L., Boavida, F., Silva, J.: Providing Applications with Mobile Agent Technology. Proceedings of the 4th IEEE International Conference on Open Architectures and Network Programming (OpenArch’01), Anchorage (2001)

Dynamic Agent Domains in Mobile Agent Based Network Management Robert Sugar and Sandor Imre Department of Telecommunications Technical University of Budapest Pazmany Peter set. 1/D, Budapest, Hungary, H-1117 {sugar, imre}@hit.bme.hu

Abstract. Today’s network management systems suffer from scalability problems and involve the transmission of large amounts of raw data towards the centralized network management station. Therefore mobile agent (MA) based solutions were presented to enhance the efficiency of network management tasks. The paper investigates the existing MA delegation schemes and migration policies, and proposes a solution for effective agent deployment using dynamic agent domains. The size of the domains is altered during the trading process, where agents exchange nodes in order to equalize their workload using a lightweight communication model. Cloning and merging operations can be initiated to modify the number of agents, providing adaptivity to changing network conditions. The presented method includes the population and load control for network management agents along with robustness and fault tolerance mechanisms to achieve a guaranteed visiting frequency for the managed hosts. Keywords: Mobile agents, Dynamic agent domains, Network management, Adaptivity

1 Introduction Network management systems are currently based on a centralized model. These systems are hard to re-configure, and experience serious flexibility and scalability problems. The major drawback of the centralized approach is the transfer of large amounts of data, such as SNMP tables, which can create a bottleneck at the central management station and unnecessarily consume bandwidth resulting in the ineffective utilization of network resources. Besides, the increasing heterogeneity of the networks greatly hinders the unified handling of all hosts. Therefore the centralized NMS usually becomes a large and complicated entity difficult to alter or maintain. Another issue is that a human network operator has increased duties as the number and the heterogeneity of the network elements grow and needs more and more knowledge of the new technologies. These problems strive for a more automated, distributed and unified network management system. A possible solution for the aforementioned weaknesses is using P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 468–477, 2001 © Springer-Verlag Berlin Heidelberg 2001

Dynamic Agent Domains in Mobile Agent Based Network Management

469

mobile agents [1] for network management tasks [3,4]. A mobile agent is a software agent with the ability to transport itself on the network and continue its execution on a new location [5]. The agent technology is not naturally dominant over the traditional client/server based solutions, since almost anything that can be solved with mobile agents can be implemented with static objects, but these solutions are usually more difficult to implement, less efficient and often clumsy. MA technology seems to be a promising paradigm in large decentralized systems and also has advantages over the traditional solutions in network management. The network heterogeneity can be hid with a Java virtual machine and a unified management API. As the agents are autonomous their deployment can lower the number of necessary human interventions. Furthermore, by their distributed functioning the load of the centralized management station can also decrease. Thus, using mobile agents for network management tasks provide [6] flexibility, autonomy, robustness and bandwidth saving. A performance analysis and the trade-off between the traditional and the agent based management can be read in [7]. This paper is organized as follows: Section 2 describes the existing agent delegation schemes currently used or proposed. Section 3 presents a new mobile agent delegation model using dynamic agent domains. Section 4 contains the evaluation of the presented method and simulation results concerning the stability and the dynamic behavior of the algorithm as well as a comparison to other methods.

2 Mobile Agent Delegation Schemes The agent deployment scheme and the agents' itinerary have a large effect on the generated network traffic and therefore on the efficiency of the whole network management system. Several approaches exist in assigning mobile agents to hosts. In [9] two delegation schemes are presented: the Get 'n' Go and the Go 'n' Stay method. At the first one the agent travels through several managed hosts whereas at the latter one an agent is exclusively delegated to the targeted host and only returns when its task is fulfilled. Similar distinctions have been made in [2] between deglets (delegation agents), which are sent out for a special task for a limited time, and netlets (network agents), which are continuously present on the network. In the remaining part of the paper we only consider the Get 'n' Go scheme for further investigations. Applications where the netlet approach can be successfully applied include network monitoring [8] and executing of recurrent tasks [9,10] in fault management or in configuration management. The semi-permanent presence of MAs is also desirable by the concept of "repair agents". Repair agents are tiny programs designed for a specific task [2]. For example, network congestion can be detected and routers could be reconfigured to handle the situation. By using agent colonies, the repair can be very fast and does not require the involvement of a human operator resulting in a higher degree of autonomy. Repair agents can also be used to prevent more severe problems to evolve by detecting and handling the problems in an early stage. The size and the location of the MAs along with the number of active agents on the network dominantly effect the response time of the system (e.g. the frequency of

470

R. Sugar and S. Imre

visiting a node) and the consumed resources. In [11] domains are predetermined for the agent at launch time, and the injection of mobile programs is exclusively performed by the mobile agent manager. In [10], swarm intelligence is used for controlling agent migration. Swarm intelligence is a biologically inspired completely distributed way of problem solving. The principle is based on individually simple and unintelligent entities showing intelligent behavior as a whole. Communication is indirect, accomplished by a set of small pieces of data called “pheromones” laid down at certain places.

3 MA Delegation with Dynamic Agent Domains In this section a new agent delegation and migration control mechanism is described using dynamically changing agent domains. The goal was to design a flexible and robust agent delegation scheme that guarantees a minimal visiting frequency of the hosts for time-critical applications. The proposed method also provides population control by using cloning and merging functions to further increase adaptivity. The agents are considered to be homogeneous and replaceable. Two types of communication are used: a direct communication between neighboring agents and an indirect communication through data structures in the managed objects - similar to the swarm in the [10] case. The latter model is used by exploration and agent fault detection described in Section 3.2. Decisions are taken in a stochastic fashion according to the current workload of the agents. Through the paper the term of agent workload is defined as follows: The amount of time required to return to a host using a sequential visiting order. Besides, the workload of a host is meaning the amount of management tasks remaining there also measured by the time it needs to complete. I used time as a measure of workload because this is in accordance with the desired visiting frequency and it also provides a unified view of every task the agent might do. If I chose a MIPS-like unit as workload indicator the CPU power and the current load of the hosts due to other than management processes could not been taken into account. For the effective operation of the agents the workload must be properly estimated. This can be achieved by measuring and remembering the previous execution and migration times and placing indications about the former visits in every host the agent visits. In addition to this distributed data structure the agent also must be aware of the workload in the whole domain since this estimation is needed to make reasonable decisions. The workload estimation is updated when arriving to or leaving from hosts based on the migration and execution time measured by the agent and the previous data stored in host. By a "forgetfulness" parameter the proportion of the newly measured and the previously stored data can be set. This parameter affects the dynamic behavior as well as the stability of the algorithm. The problem is that a sudden and permanent change in network conditions is hard to be immediately distinguished from a simple jitter. Thus, to avoid the overreacting a discrete delay and still have fast reac-

Dynamic Agent Domains in Mobile Agent Based Network Management

471

tion time to an overload situation the forgetfulness parameter should have a fair and reasonable value. 3.1 The Functioning of an Agent The lifecycle of an agent consists of three stages: Normal operational phase, when agents roam their domains performing the regular tasks; trading phase, where domain corrections are initiated and cloning/merging phase, where heavily loaded agents can multiply, or two underloaded agents can merge. 3.1.1 Normal Operational Phase In the normal operational phase agents perform their management tasks by sequentially visiting the hosts of their domain. These management tasks can be either recurrent or single tasks depending on the type of the agent. Round Robin visiting order is used for intra-domain migration. The method was chosen, besides its simplicity, because in that case the agent migration is predictable and starvation of nodes can be avoided, which is essential to provide a minimum visiting frequency for the hosts. The routines of performing the actual tasks on the nodes are application-specific and out of scope of the paper. 3.1.2 Trading In our perspective trading is a transaction between two agents where one of the parties shifts and the other one obtains the responsibility over a specified node. The trading is only initiated with a limited scope – between neighboring domains – to reduce communication costs. The trading process starts with the domain workload measurement where the agents evaluate their domain size according to predefined parameters – optimal, maximum and minimum load. When the MA decides whether to receive or dispose nodes, it contacts the neighbors searching for possible trading partners. The trading strategy can vary from "greedy", where only mutually advantageous transactions are completed to "altruistic", where asymmetric deals can occur between a greatly overloaded and a slightly overloaded agent. Altruism can help to avoid getting stuck in local optima and achieve a globally acceptable performance, but can lead to slow degradation when overused. 3.1.3 Cloning/Merging If the neighbors reject trading offers and the agent load is still unsatisfactory, the MA can choose to "clone" itself or "merge" with another agent with a certain probability depending on how critical its state is. Cloning means that the previous domain is split into two parts for the two newly born agents, which are considered to be equal. These agents start the trading process right after birth to harmonize the domains with the surrounding MAs. Cloning is essential when dynamic changes occur in the network such as a newly opened subnetwork that needs to be populated, or overload on the nodes or on the links that slow down the operation of MAs.

472

R. Sugar and S. Imre

During the merge process two agents unite their domains resulting in a single MA that immediately starts the trading process to deal with its enlarged domain size. The process is required to reduce the number of agents when too many of them are present of the network, especially after a recovery from a fault or a critical network situation. 3.2 Robustness The system implements several procedures to provide error-tolerant functioning. During the normal operational phase the MA regularly inspects the neighboring hosts of the domain, searching for faults such as expired time stamps or a missing host responsible. If an error is detected the agent may try to contact with the host owner, explore the nearby area or initiate the node seizure process, where the MA can unilaterally take the responsibility over a managed object. In case of an agent crash, congestion in the network or trashing, the domain of the MA is soon to be populated by the neighbors providing fault tolerant and robust functioning. 3.3 Starting an Agent Colony The distribution of the initial agent colony can be accomplished several ways. When a new agent type is created at the NMS the goal is to have them spread out on the whole network. This can be left to the standard agent mechanisms or different techniques could be used to boost up the initial agent spawning process. 3.3.1 Starting with One Agent In that case the mobile agent generator spawns only one single agent with a domain of one single host. The agent realizes that the neighboring nodes have no owner and starts to explore the network. As its domain grows it quickly multiplies spawning other agents that will soon continue the exploration and will eventually populate all of the network. To speed up the creation of the initial population spawning behavior can be set to aggressive in the beginning of the populating process. 3.3.2 Starting with Multiple Agents It is also possible to initiate the colony with several mobile agents. They can either start from one single host or from multiple hosts. The first case is similar to the previously described process, it only gives a startup boost to agent spawning. If we use more than one host during initiation we must synchronize the startup and make sure that all the agents have the same code. Using multi-host initiation smoothes up the network traffic due to excessive agent multiplication and can be more effective on a network with rare connectivity especially when the subnetworks are connected by only one node or not connected at all.

Dynamic Agent Domains in Mobile Agent Based Network Management

473

3.4 Physical and Logical Topology First we have to define the idea of logical topology. Logical network topology is a virtual set of connections stored in the hosts. If the physical topology of the managed network is rare in connections the use of logical topology can facilitate the correct functioning of the algorithm. The logical topology should follow the physical topology, because setting up an arbitrary set of connections will greatly increase the migration time. Let us consider an FDDI ring for instance. If we used the physical topology only with coherent domains the domain of the agents would be sectors with only two neighbors. In that case the trading was only possible for the two side nodes of every sector. By defining a logical topology that introduces extra virtual connections between the ring members can allow effective trading and merging. 3.5 Overpopulation Control A very undesirable situation is that when due to incorrect workload estimation, agent malfunction or fraud, the agents start to multiply in an uncontrollable fashion and flood the network. A solution for that is to maximize the number of agents present on the network. It should be designed not to interfere with the normal functioning of the agent but to set up an upper bound for the number of agents instead. It can be based on credits as in [14]. It means that the original initial agent has the credit of the maximum number of agents, which is conservatively divided through every spawn and integrated through every merge. If the credit of the agent is one it cannot spawn anymore. In order to provide some flexibility, it can obtain also credits from neighbors. The credit sharing is executed during trading as well to prevent the bulk of the credits concentrating in a relatively peaceful segment of the network when there is a great need of spawning on the other side.

4 Evaluation and Simulation Results A simulator was designed to evaluate the algorithm. The system was tested in several simulated network conditions and numerous parameters were introduced to control the behavior of the agents. The most important ones were: the pre-defined optimal load according to the desired visiting frequency; the probability functions for trading, spawning and merging; and the selfishness of the agents in accepting trading and merging offers. During simulation the normal behavior of the agents was analyzed on a stable network investigating whether the MA domains and the workload of the agents tend to equalize. Another question was that how the adjustment of parameters affects stability. The analysis also targeted the dynamic performance of the system in a sense that how fast it can respond to sudden changes on the network. In the next figures we present a set of simulation results concerning the functioning of the algorithm.

474

R. Sugar and S. Imre

Fig. 1 shows the number of agents on the network in a dynamic network situation. The optimal agent population is calculated by dividing the workload on the whole network with the optimal workload of the agent. As it shows after a stable network condition the workload starts to rise and then peak on a certain level followed by a gradual fall of work amount. On a stable network (such as in timeframe 10-20 and 70-90) the number of agents is very close to the optimal value. This stands for most of the test cases investigated. In rapidly changing conditions (timeframe 20-50 and 100-120) the actual population of the agents follows the change in workload by increasing the spawning or merging activities and thus modifying the population. The delay of the reaction, and in parallel with it the overhead caused by the trading process, can be adjusted by the agent behavior parameters.

Agent population 45 40

Population

35 30 25 20 15 10 5 0 1

11

21

31

41

51

61

71

81

91 101 111 121 131 141 151 161 171 181 191 201

Time Actual population

Optimal Population

Fig. 2. The current and optimal agent population in dynamically changing network conditions Relative Average Standard Deviation 60 50

%

40 30 20 10 0 1

11

21

31

41

51

61

71

81

91 101 111 121 131 141 151 161 171 181 191

Time

Fig. 1. Agent workload concerning the average relative standard deviance from the predefined optimal value

Dynamic Agent Domains in Mobile Agent Based Network Management

475

Fig. 2 shows that on a stable network the deviation of the agent workload can be about ten percent of the pre-defined optimal value. This deviance greatly depends on the deviation of work on the hosts, which cannot be influenced by the agent. This means that most of the deviation comes from the imprecise estimation of the workload, not from the incorrect functioning of the load-sharing algorithm. During simulation we experienced that on a stable network, with correct configuration of the parameters, the agent workloads tended to equalize over time and showed stability in the long term in almost every simulation case. The parameter that had the largest effect on the stable agent distribution was of course the pre-defined optimal workload value, which determined the average size of agent domains and thus the average visiting frequency for a host. We also investigated the dynamic functioning of the algorithm. Comparing to the previous case the parameter configuration has a larger effect on the behavior of the system. The most vital parameter was the frequency of the trading process and the pre-defined critical workload values. 4.1 Comparison to Other Delegation Methods We also made a comparison to the previously existing agent delegation schemes. We found that static agent domains can be effective for a relatively stable network, but when dynamic changes occur – which are very likely to happen by network faults – the performance of the management can significantly decrease. Constant domains work best on highly hierarchical networks where the physical topology can be used to determine agent domains exploiting that intra-subnetwork migration is much cheaper than inter-subnetwork agent transport. Our method looks dominant when robustness and flexibility are taken into account but also adds some additional costs introduced by the agent cooperation. Comparing to the swarm intelligence based solution the greatest advantage is the more predictable agent behavior that allows the assured visiting frequency. Considering that agents in the Swarm tend to migrate towards areas with higher pheromone density, hot spots can form on the network, while other areas remain virtually unpopulated. Nodes do not have a clear responsible, thus double-checking of hosts can easily occur when certain nodes can be ignored. We found that the swarm can be effective with non time-sensitive applications, but the minimum visiting frequency is hard to be assured without further enhancing the communication scheme.

5 Conclusions and Future Work In the paper a new MA delegation and migration control scheme was presented for semi-permanent network management agents. Dynamically changing agent domains were used to provide flexible, adaptive and robust operation. The trading process enables the agents to exchange nodes allowing the dynamic transformation of agent domains towards the equal work sharing between the MAs. Cloning and merging is

476

R. Sugar and S. Imre

used for controlling the agent population to approach a globally optimal agent distribution. The advantages of the method are the decentralized operation and limited scope of communication over centralized management models, guaranteed visiting frequency and a more calculable behavior over the swarm based solutions and flexibility and fault-tolerance over constant agent domains. During simulation stability and convergence were analyzed and results show that with an appropriate selection of agent behavior controlling parameters the workload of agents tend to equalize over time. The system can rapidly react to dynamic changes on the network such as a network fault, an unpredicted congestion or overload, and also provides robustness in the case of an agent malfunction or termination. In the future the focus will be placed on enhancing the algorithm with a hierarchical control, and investigating other application areas in agent based simulation and in biologically inspired multi-agent systems. Another way of advancement is to deploy agent colonies on originally flat networks such as ad-hoc mobile networks for different network management tasks or even facilitating smooth packet transmission or routing.

References 1. 2. 3.

4. 5.

6.

7.

8.

Pham V., Karmouch A., "Mobile Software Agents: An Overview", IEEE Communications, Vol. 36, No 7, pp. 26-37, 1998. Andrzej Bieszczad, Bernard Pagurek, and Tony White. Mobile agents for network management. IEEE Communications Surveys, Vol. 1. No.1. September 1998. Gavalas D., Greenwood D., Ghanbari M., O'Mahony M., "An Infrastructure for Distributed and Dynamic Network Management based on Mobile Agent Technology", Proceedings of the IEEE International Conference on Communications (ICC'99), pp. 1362-1366, 1999. Goldszmidt G., Yemini Y., "Delegated Agents for Network Management", IEEE Communications Magazine, Special Edition on Network Management Paradigms, March 1998. Lange D., "Mobile Objects and Mobile Agents: The Future of Distributed Computing?", Proceedings of The European Conference on Object-Oriented Programming (ECOOP'98), 1998. A.Puliafito, O. Tomarchio, "Advanced Network Management Functionalities through the use of Mobile Software Agents", Proceedings of the 3rd International Workshop on Intelligent Agents for Telecommunication Applications (IATA'99), LNCS vol. 1699, pp. 3345, August 1999. M. Rubinstein, O. C. Duarte, "Evaluating the Performance of Mobile Agents in Network Management", Proceedings of the IEEE Global Communications Conference (Globecom'99), December 1999. Liotta A., Knight G., Pavlou G., "On the Performance and Scalability of Decentralised Monitoring Using Mobile Agents", Proceedings of the 10th IFIP/IEEE International Workshop on Distributed Systems: Operations & Management (DSOM'99), October 1999.

Dynamic Agent Domains in Mobile Agent Based Network Management 9.

477

Gavalas D., Greenwood D., Ghanbari M., O'Mahony M., "Using Mobile Agents for Distributed Network Performance Management", accepted to the 3rd International Workshop on Intelligent Agents for Telecommunication Applications (IATA'99), 1999. 10. T. White, A. Bieszczad and B. Pagurek, Distributed Fault Location in Networks Using Mobile Agents. In Proceedings of the Second International Workshop on Agents in Telecommunications Applications (IATA '98), pp. 130-141, July 4th-7th, 1998. 11. D. Gavalas, D. Greenwood D, M. Ghanbari, M. O'Mahony, "Advanced Network Monitoring Applications Based on Mobile/Intelligent Agent Technology", Computer Communications Journal, special issue on "Mobile Agents for Telecommunication Applications", publication in January 2000. 12. Armin R. Mikler: Agent-Based Wave Computation: Towards Controlling the Resource Demand. Department of Computer Science University of North Texas, Denton, Texas 76203, USA. [email protected]

Networking in a Service Platform Based on Mobile Agents Marko Palola Wireless Internet, VTT Electronics Kaitoväylä 1, FIN-90571 Oulu, Finland [email protected]

Abstract. Generic service platforms are rapidly evolving technology. New mobile devices are introducing new features, which could be used to offer advanced services to a large customer base. This paper focuses on our experiences on developing human-assisted services for different user devices on-top-of experimental software agent platform. Service development work is eased using proxy-based communication, which allows rapid service construction without burdening developers with technical details of user devices and agent system internals such as protocols, synchronisation and security.

1

Introduction

New possibilities for user services emerge due to the advances in user terminal technology and wireless networks. Currently, new user devices such as Personal Digital Assistants (PDAs) and mobile phones support web-based content. Wireless Application Protocol (WAP)-based services in Europe and i-mode services in Japan are becoming more and more popular. Wireless communication technologies such as GPRS and UMTS only now being appreciated for their potential to introduce new services to a very large customer base. Currently, the most of the services such as travel, secretary and number inquiry services are centralised around telecom switches, but in the future services will also cover personal productivity and office environment [1]. The major problem with service platforms is twofold. Firstly, there will be many types of user devices with different functionality and secondly, the service platforms must support several different access methods and protocols, e.g., connections to systems such as databases, telecommunication networks, e-mail systems, the Internet, etc. New and innovative ways are needed to develop services on these dynamic and heterogeneous service environments. One method of this kind could be realised using software agents. Especially mobile agents have interesting features [2,3], which benefit the service development, i.e., a mobile agent works autonomously on the behalf of the user, agent represents user in computer networks and agent has knowledge about itself and the surrounding environment. This paper focuses on developing networking support for different user devices in a service platform called DAN - Distributed Agent Network. P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 478–487, 2001 © Springer-Verlag Berlin Heidelberg 2001

Networking in a Service Platform Based on Mobile Agents

2

479

Distributed Agent Network

Overview of the DAN system is shown in Figure 1. DAN is an experimental system to address the challenge on service development for different types of user devices. In addition to computer-based services, DAN has been designed to support development of human assisted services such as number inquiry, help desk, corporate call center and travel services.

Fig. 1. DAN contains software agent systems, which form a network. Each user is connected to agent network via stationary agents called terminal gates, each of which is dedicated to support one type of user terminal, e.g., graphical user interface, mobile phone with SMS (Short Message Service) or WAP support or wireless PDA with WWW-based access. The goal of the DAN system is to connect the customer and operator regardless of their terminal type.

In DAN, each user has a personal agent who stores user related information such as phone numbers, address and data from the previous service sessions. User logs on to the agent using one of the terminal gates and access available services using information gathered by the agent [4]. Basically, user agent always forwards messages to the user's current terminal gate, or optionally to the user's e-mail address or GSM phone via SMS, if the user is not currently logged on. Interesting benefit is that the service provider can contact the customer using customer's preferred device in the same way that customer contacts the service. Agent systems in DAN are categorised as mobile multi-agent systems with simple agents, i.e., the mobile agents have only limited intelligence and they can communicate with each other [5]. The DAN agent system is divided to the following layers: agent system core, service and agent, terminal gate, repository, communication, database and security layers. The agent system core executes agents and terminal gates and offers them system resources from the other layers. The services are constructed on-top-of agent layer and the user device support at the terminal gate layer. The repository provides information about agent locations, available services and other naming information for agents and agent systems. The communication layer manages connections to other agent systems and transfers messages between agents and terminal gates. Message routing is based on global names similar to the Mole

480

M. Palola

agent system [6] and Ajanta [7]. Database layer provides persistence for agent and service data. Security layer provides encryption of messages and authentication of agents, agent systems, and terminal gates. The main difference between this and other agent systems is on the service development level and the terminal gate level. Both layers can be extended without making modifications to the agent, the agent system core or security layers. At the service level, adding a new service means that agents extend their behaviour at run time. This flexibility creates some overhead to the agent-to-agent communication compared to a situation in which the agents are customised only for a certain purpose. The benefit of this flexibility is that new services can be created more rapidly, because developers doesn't need to know the details of the underlying distribution techniques, security, agent system core or communication layers [4].

3

Networking Architecture

As discussed in the previous chapters, networking in DAN is based on two principles. Firstly, an agent system supports different user terminals via dedicated stationary agents called terminal gates. Secondly, services are provided and accessed using personal agents. Networking affects to the top-most layers of the DAN, the service and terminal gate layers. In the agent layer of DAN, the agent behaviour is extended at run time using objects called tasks, which are software components executed by agents [8]. So, a task in this context is not a goal of an agent, but instead, a set of agent tasks defines which kind of functionality is provided for other tasks in the system. Any number of tasks can be used to implement the service behaviour. Usually, one or two interfaces are implemented as a task and allocated to one of the agent (Figure 2). The communication in DAN is based on proxy objects or the proxy principle [9], which is extended to use encryption. The proxy defines the same access methods (interface) as the object it represents. The method invocation with a proxy object appears similar to method call with a local object. Each task, terminal gate and agent distributes proxy objects, which could be accessed by others. The agent system transfers method calls between the proxy and the original object, executes the method call and transfers return values or an exception back to the method caller. To route this method information in encrypted format, the proxy object contains a public key and a global name of the service agent. The agent decrypts the method call information using a private key before the method call is made to the task object. The object using the proxy is also detected by the agent system and the public key for encrypting the method return value is also added to the method call information. Figure 2 illustrates the main parts of the system, which are used to develop services and to provide networking between different devices. The developer of the service needs to design and implement the task and the ServiceData objects in order to extend the functionality of DAN agents. As long as the gates function in the same way, the service developer needs to implement the service only once. It is possible to add new terminal gates into the system later and use them to access the existing services.

Networking in a Service Platform Based on Mobile Agents

481

Service Layer User Agent Proxy

Task

Service Proxy

Service Agent GUIGate proxy

SMSGate proxy

Terminal Gate Layer

WWW Gate GUI Gate

User Agent

Email Gate

Operator

SMS Gate

GUI Gate

ServiceData ServiceData ServiceData

SMS Gate

Customer

Fig. 2. The system allows the GSM user to send messages and communicate with an attendant who has a graphical user interface. Both users employ a terminal gate, which supports the device. There are two agents involved, a service agent owned by the operator and a user agent for the customer. The agent has the proxy to the user's terminal gate and all messages to the user are routed via the agent. Typical message contains a ServiceData object, which defines a user interface to be constructed by the terminal gate and it also contains proxy objects to remotely access both the user agent and the task of the service agent.

The service is implemented as task of the service agent. Task maintains all servicerelated data, which is accessed using a proxy object or a user interface distributed by the task itself. Customer agents may also have tasks in order to access the service interface without user interaction and to provide more interactive services. At the beginning, customer logs on to the user agent by sending a login message via the SMS Gate. During login, the user agent receives a proxy object to the SMS Gate and uses it to send a reply message to the customer terminal. The login reply (again a ServiceData object) contains a list of available services to the user, which are found using lookup routines provided by the agent system. In the user interface displayed by the SMS Gate, the user can select one of the services and ask the agent to contact it. The task of the service agent creates a ServiceData object when the user agent contacts the service. At the same time, the service task receives a proxy object to the user agent. The task of the service agent sends new ServiceData objects to the customer's gate via the user agent. Similarly, the task of the service agent can update the operator's user interface using the service agent. The agent system takes care of transferring messages between the service and terminal gate layers. The location of terminal gates, user and service agent is transparent to the users as well as the current device of the operator and user is not visible to the task of the service agent. Only the terminal gate exchanges information with the user terminal or device. The following chapter shows an example of service implementation and reveals the functionality of the terminal gates and ServiceData objects, which are responsible of implementing networking with different devices and protocols.

482

4

M. Palola

Service Example

The following code examples show a simple agent task and some examples from the system components, which enable proxy-based communication between tasks. The development requires the following parts. Firstly, we need an interface to define the access methods of the task and its proxy. Secondly, the task and proxy objects are implemented using the interface. If the task requires a user interface, a ServiceData object is also developed. This example task could be allocated to any agent to maintain a list of user messages. The interface (MessageBox) contains some methods that are accessed from the remote user interface when it is displayed by a terminal gate: Vector getMessageTitles(); void removeMessage(String title); ServiceData getMessage(String s); void removeMessage(ServiceData d); The task of the agent then implements the interface and behaviour. All the messages stored into the MessageBox are also ServiceData objects, so the messages always include user interface descriptions similar to tasks. public class MessageBoxTask extends BaseTask implements MessageBox, ServiceProvider{ List messages; //stores current messages Agent agent; MessageBoxData data; The MessageBoxData is a ServiceData class, which contains layouts of remote user interfaces. The agent is a reference to the executing agent and it provides access to the current system such as lookup routines to discover proxy objects and services. public boolean start(Agent agent) { this.agent = agent; if(messages == null) { messages = new LinkedList(); } return true; } Start and stop methods indicate when task should initialise and free resources. Task also receives the agent instance in the start method. public ServiceData openService(Agent requester){ data = new MessageBoxData(this, requester); return data; } The ServiceProvider interface defines the openService method, which creates a ServiceData object to be transferred to the terminal gate of the user. Typically, the customer's personal agent calls this method. The agent system will detect that the MessageBoxData contains an instance of our task object (given via the constructor using 'this'). This object is not serializable and therefore it could not be transferred over network, so the agent system automatically creates and replaces the original

Networking in a Service Platform Based on Mobile Agents

483

instance with the corresponding proxy object. The benefit of this is that developer need not specify proxy objects in the code. Although, such a method is needed when task implements several interfaces and publishes different proxy objects for them. The next example shows the main parts of the MessageBoxData class, which works as a remote user interface to the task object. In general, the ServiceData objects include − a few user interface formats to construct service user interfaces, − a proxy objects to the task of service agent and to the user agent and − service based actions and codes to execute selected actions and error handling. The constructor defines that this data supports 3 different user interface formats (graphical, textual and HTML format). There is a set of predefined formats which each contain a data structure customised for the terminal gate. For example, a ComponentFormat instance always contains a JPanel object and HTMLFormat contains partial HTML page. MessageBoxData(MessageBox box, Agent agent) { this.messageBox = box; this.agent = agent; addSupportedFormat(ComponentFormat.class); addSupportedFormat(TextFormat.class); addSupportedFormat(HTMLFormat.class); } The actual user interface is created by the terminal gate using the getInFormat method. In this case, the list is created using remote calls to the MessageBoxTask via the proxy object. public DataFormat getInFormat(Class type) { StringBuffer str = new StringBuffer(); if(type.equals(TextFormat.class)) { Vector messageTitles = messageBox.getMessageTitles(); str.append("You have "+messageTitles.size()+ "messages."); for(int i=0;i-1&&titles.size()>0&&titles.size()>index){ messageBox.removeMessage( (String)titles.elementAt(index)); buffer.append("Removed message:"+ titles.elementAt(index)); } else buffer.append("Could not remove message:"+ index); return new TextMessage(buffer.toString()); } else if(command.startsWith( //process other commands When the command is executed, both the user agent and the service task could be remotely accessed using the proxies. The executeCommand method returns a textual message indicating the results of the command, which is shown to user. In order to allow user to access the service via terminal gate, it must − − − −

display the service list, and open the selected service into the user interface, provide user login and logout functionality. execute selected commands and display the results into the user interface, keep track of ServiceData objects and update the user interface when new data arrives and − select one of the user interface formats, modify and display the user interface with a selection of service based commands. Networking required by different user devices only has an effect at the service and terminal gate layers of the agent system. It is also important that service developers can customise user interfaces by specifying user interface layouts and service-specific commands to provide more functionality to the user interface. Task and terminal gatebased development in DAN requires the learning of only a few interfaces (Agent, Gate, Task, ServiceData, DataFormat, ServiceProvider) to develop services for different devices. In the DAN service development, the most of the work is required by the service user interface, because we must create three initial layouts for different types of user interfaces (graphical, HTML and text-based) to meet even simple look-and-feel requirements. Despite that fact, a simple service with single user interface format (textual) and user commands is usable via SMS, HTML or graphical user interfaces. We considered developing a script system or using XML to define the service user

Networking in a Service Platform Based on Mobile Agents

485

interfaces, but we later decided to use these separate formats, because they matched to available user devices.

5 Performance Performance of remote method calls in the DAN system has been measured using 100 user agents. In the tests, each agent made hundred remote method calls to the task of the service agent resulting in 10 000 requests. In the first test, the average method call time was 325 ms., while the service agent was at the same computer (NT 4.0, Pentium II 400 MHz, 196Mb, JDK 1.2 with JIT) with the user agents. Minimum and maximum method call times were 50 ms and 1600 ms. In the second case, the service agent was moved to another computer (NT 4.0, Pentium Pro 220 MHz, 128 Mb, 100 Mbit LAN) and the test was repeated. Remote method calls were executed at 1667 ms on average, while the maximum was 4060 ms and the minimum 120 ms. Testing with 10, 20 and 50 agents and with different message sizes indicated that remote method calls are approximately four times slower over LAN. Typical message size was three kilobytes without compression. It should be noted that both computers were swapping heavily, indicating a lack of memory during the tests and the encryption was turned off. It is well known that Java interpretation, garbage collection and compilation techniques affects performance [10]. In our case, Java JIT compiler improved the remote method call execution time by 30 %. We used a larger heap size in the Java execution environment (128 Mbytes) and compiled the code using optimisations (the /o parameter).

6

Related Work

There are many different Java-based agent platforms available, Pham and Karmouch, for example, provides an overview and comparison of a number of systems [11] and Green et al. reviews some mobile agent systems [12]. A lot of software agent work is related to telecommunications [13]. Proxies are also used in other agent systems to enable remote access [14,15]. In DAN and other agent systems, the services are made virtually available for the user agents, which makes the system inherently insecure. However, these systems rely on external security such as SSL (Secure Sockets Layer) to encrypt communication between agent systems. In DAN, the proxy-based communication between agents is also encrypted using RSA [16] implementations called Cryptix [17] and Forge [18]. One agent platform for telecommunication systems is Grasshopper [19]. With Grasshopper as well as many other agent systems, service development requires that new agents are created into the system. We believe that this requires a deeper understanding of the agent system's internal functionality than is necessary in service construction for different devices. By using DAN, the service provider can construct new services on-top-of agents without knowing the details of the underlying agent system. New devices are not directly supported by other agent systems either even

486

M. Palola

graphical user interfaces are usually made in a similar way to DAN graphical terminal gates. Developing agent systems has become popular with the Java programming language [20]. Java Remote Method Invocation (RMI) uses similar proxy objects to DAN, but RMI lacks mobility support. When the RMI object is moved, its name (network address) is changed and all users of that object must rediscover the access to that object. In our approach, the original object can move with its agent to different location without requiring any actions from the remote users. The agent system transfers method calls using global names and location information from the agent system repository.

7

Conclusions

Implementing network support for different devices is a difficult task due to new emerging handheld terminals with different service access methods. DAN is a platform for service development in such environment. DAN eases the development of services by abstracting underlying technical details such as network addresses, user terminal features, data persistence and encrypted communication from the service developers. New services are added to the network by allocating task objects to agents. Developers can focus on developing service interfaces, and implementing the service on-top-of agents by creating agent tasks and remote user interfaces. Proxy-based communication makes new services immediately available to all supported terminal types via their respective terminal gates. DAN also provides a feature, which allows service providers contact the customer using the customerpreferred device via software agents. Basically sending information from operator to user requires two remote method calls. Agent system routes information from the operator user interface to the user's agent who updates the terminal gate. Currently, system supports public key cryptography, which means that there are four encryption and decryption operations in each method call. Unfortunately, this slows down the system and encrypted communication is not sufficient for services with real-time requirements. Typical services could be personal and office services using any device, e.g., e-mail access and notifications, travel or other request-response type of service. Security is also deteriorated by external servers such as WAP gateways, e-mail and www servers, which transport data from the terminal gate to the user device.

Acknowledgements The work presented in this paper has been accomplished in a national research project called CTI (Computer Telephone Integration). The CTI project is funded by the Technology Development Centre of Finland (TEKES), Nokia Internet Communications, CCC Data Ltd., Nokia Networks Ltd., Koillismaan Yrityspalvelukeskus, the University of Oulu and VTT Electronics. The support of the project consortium is greatly acknowledged.

Networking in a Service Platform Based on Mobile Agents

487

References 1. Bradshaw, D., Sheina, M., Glassman, S., O´Loughlin, M.A.: Computer Telephone Integration: From Call Centre to Desktop. Ovum Reports, Ovum Ltd. (1997) 2. Shoham, Y.: An Overview of Agent-oriented Programming. In Bradshaw, J.M. (ed.): Software Agents. AAAI Press, Menlo Park CA (1997) 271-290 3. Anonymous: Mobile Agent System Interoperability Facilities Specification. Joint Submission. OMG TC Document, orbos/97-10-05 (1997) 4. Palola, M., Heikkinen, M., Kaksonen, R.: Improving Telecom Service Access Convergence using Software Agents. The 1st Asian-Pacific Conference on Intelligent Agent Technology. Hong Kong, China (1999) 5. Brenner, W., Zarnekow, R., Wittig, H.: Intelligent Software Agents: Foundations and Applications. Springer-Verlag, Berlin Heidelberg (1998) 6. Baumann, J., Hohl, F., Rothermel, K, Schwehm, M., Straβer, M.: Mole 3.0: A Middleware for Java-Based Mobile Software Agents. In Davies, N., Raymond, K., Seitz, J. (eds.): Middleware'98. Springer-Verlag, London (1998) 355 - 370 7. Tripathi, A., Karnik, N., Vora, M., Ahmed, T., Singh, R.: Mobile Agent Programming in Ajanta. The 19th International Conference on Distributed Computing Systems. (1999) 8. Palola, M., Heikkinen, M.: Constructing Mobile Web Services on a Software Agent Platform. In Graham, P., Maheswaran, M. (eds.): The International Conference on Internet Computing. Las Vegas, Nevada, USA (2000) 9. Shapiro, M.: Structure and Encapsulation in Distributed Systems: the Proxy Principle. The Sixth International Conference on Distributed Computer Systems (ICDCS). (1986) 198-204 10.Dikaiakos, M., Samaras, G.: Quantitative Performance Analysis of Mobile Agent Systems A Hierarchical Approach. Technical Report TR-00-2. Department of Computer Science, University of Cyprus (2000) 11.Pham, V.A., Karmouch, A.: Mobile Software Agents: An Overview. IEEE Communications Magazine, 31(7). (1998) 26-37 12.Green, S., Hurst, L., Nangle, B., Cunningham, P., Somers, F., Evans, R.: Software Agents: A Review. Technical report http://www.cs.tcd.ie/publications. University of Dublin (1997) 13.Hayzelden, Alex, L.G., Bigham, J.: Agent Technology in Communications Systems: An Overview. Knowledge Engineering Review, Vol.14, No. 3 (1999) 1-35 14.Biskup, J., Freitag, J., Karabulut, Y., Sprick, B.: A Mediator for Multimedia Systems. Third International Workshop on Multimedia Information Systems. Como, Italia (1997) 145-153 15.Chess, D., Grosof, B., Harrison, C., Levine, D., Parris, C., Tsudik, G.: Itinerant Agents for Mobile Computing. IEEE Personal Communications, vol. 2, no. 5. (1995) 34-49 16.Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, Vol.21, Nr.2 (1978) 120-126 17.Anonymous: Cryptix JCE 3.1.0. http://www.se.cryptix.org/products/jce/index.html (1999) 18.Anonymous: Forge JCE 1.32. http://www.forge.com.au/Products/crypto/index.html (2000) 19.Breugst, M., Choy, S., Hagen, L., Höft, M., Magedanz, T.: Grasshopper–An Agent Platform for Mobile Agent-based Services in Fixed and Mobile Telecommunication Environments. In Hayzelden, A.L.G., Bigham, J.(eds.): Software Agents for Future Telecommunication Systems. Springer-Verlag, Berlin Heidelberg (1999) 20.Gosling, J., McGilton, H.: The Java Language Environment: A White Paper. Sun Microsystems (1995)

Realizing Distributed Intelligent Networks Based on Distributed Object and Mobile Agent Technologies 1

1

1

Menelaos K. Perdikeas , Odysseas I. Pyrovolakis , Andreas E. Papadakis , 1 and Iakovos S. Venieris 1

National Technical University of Athens – Dept. of Electrical & Computer Engineering 9 Heroon Polytechniou, 157 73 Athens, Greece {perdikea,ody,apap}@telecom.ntua.gr [email protected]

Abstract. An architecture enhancing the Intelligent Network to a Distributed IN is described. To this end, Distributed Processing Environment and Mobile Agent technologies have been employed. The added value, in the context of flexibility and manageability of the exertion of the aforementioned technologies, as well as the extent to which they can be utilized are discussed. The configuration architecture is presented and an implementation – oriented, detailed description of the Service Execution Node and its constituents is provided.

1 Introduction The Intelligent Network (IN) approach for providing advanced services to end users aims primarily at minimizing changes in network nodes by locating all “servicerelated” (and thus likely to change) functionality in dedicated “IN-servers”, named as “Service Control Points” (SCPs) [1], [2]. These servers are in a sense “external” to the core network which in this way needs to comprise only a more or less rudimentary switching functionality and the ability to recognize IN call requests and route them to the specialized SCPs. Since the time of its standardization by ITU-T [3], IN has become the default way for telecom operators to enhance the ability of their core network to provide value added services to their customers in a cost effective manner. In this paper we are considering the use of distributed processing technologies such as CORBA (Common Object Request Broker Architecture), DCOM (Distributed Component Object Model) and RMI (Remote Method Invocation) along with mobile code ones in order to enhance IN’s potential. We are mainly focusing on issues concerning the design and implementation of an IN architecture that would be more flexible, distributed and facilitating object oriented service creation and efficient services life cycle management.

2 Applying New Software Technologies in Intelligent Network Before going on into describing the actual architecture, a more abstract and general discussion containing some of our experiences and issues emerging when applying novel software technologies in the context of IN precede. Specifically, the impact of P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 488–496, 2001 © Springer-Verlag Berlin Heidelberg 2001

Distributed Intelligent Networks Based on Distributed Objects and Mobile Agents

489

the introduction of well known distributed object practices (such as CORBA [4]) and more radical solutions (such as Mobile Code [5]) are discussed. 2.1 Enhancing IN with CORBA Commercial IN implementation rely on traditional protocol stacks for dispatching messages between elements of the architecture. These protocols rest on the asynchronous exchange of messages and are thus termed “message-based” protocols. Problems with such protocols and the relative merits of the more advanced and generic remote method invocation paradigm have been recognized by many researchers and are well documented. CORBA is a standardized solution to provide distributed processing capabilities to an environment and the closest to being a “de jure” one. Microsoft’s DCOM is a more proprietary technology having as main advantage its tighter binding with the MSWindows operating systems. Given the diversification that characterizes telecommunication systems, CORBA is more or less the only distributed object technology that can seriously been contemplated in this context. Distributed object technologies extend the notion of a memory or an object pointer to include pointers to remote address spaces. Using CORBA’s terminology these are termed “Interoperable Object References” (IORs). IORs are not only opaque handles to the objects they represent but can also serve as a generic network addressing scheme. An object doesn’t have to be aware of the IP address and the port number on which its peer object “listens” – it is simply responsible for obtaining its “handle” and passing it to the CORBA runtime layer (known as ORB – Object Request Broker) whenever it wants to communicate with it. This allows the architecture to be transport protocol independent. Irrespectively of whether the underlying transport mechanism is TCP/IP or ATM or ISDN, as long as a CORBA layer can operate on top of it, the communicating objects only have to perceive the semantics and the notational conventions used by CORBA. The architecture can be reconfigured with no changes to the hosted objects at all. Communicating objects can be thought of as “plugging” on a generic method-invocation relaying layer (the ORB) and from that point on being able to invoke arbitrary methods on other objects “plugged” onto it as well. In contrast, reconfiguration of an architecture based on traditional “messagebased” protocols is much more difficult. 2.2 Mobile Code in Intelligent Networks In the traditional IN architecture Service Logic Programs (SLPs) run in centralized SCPs. This approach naturally renders the network vulnerable to “single point of failure” types of problems as well as makes it susceptible to performance penalties associated with the intrinsic bottlenecks that any centralized architecture has. When utilizing mobile code, SLP distribution among the core network nodes, Service Switching Points, (SSPs), can come very naturally if SLPs are implemented as mobile code objects [6]. Once a mobile code platform is installed on each of these nodes, SLPs can be downloaded on demand or in an off-line fashion for load-balancing purposes, to respond to a failure in a node they were previously residing or to preserve network resources. The fact that mobile code platforms are relatively generic

490

M.K. Perdikeas et al.

infrastructures hosting a large number of SLPs and being oblivious to their functionality and operations, facilitates the introduction of new and withdrawal of old services. Because of being generic, these components may never (or in any case very infrequently) need to be modified. The ability of the SLPs to migrate to SSPs and continue their operations from their new location, augments each SSP with SCF functionality. Service provisioning can be offered directly by the switches’ physical entities removing entirely the need for a centralized SCP. This should not be confused as reverting to switch-based services implementation as now, services are not statically bound to the switches but retain the flexibility of mobile code objects. As a result, all advantages offered by IN with respect to speedier introduction of new services are maintained. We refer to the resultant IN architecture as Distributed IN (D-IN). It is important to note that the use of mobile code in IN, is not separated from the use of distributed technologies. In fact, distributed technologies and mobile code are used in concert and are of equal importance to realizing the D-IN concept. First of all, they are both IT-based paradigms and have predominant Object-Oriented characteristics. Both technologies’ offerings have to a significant extent to do with non-functional characteristics1, which are moreover complementary. Distributed technologies are concerned with location transparency and increase programmer’s productivity whereas mobile code aims at offering performance benefits by moving client (or server) code closer to where it is actually executed, instead of engaging in network spanning and bandwidth consuming remote dialogues. [7] CORBA’s approach to “objectizing” even procedural pieces of code through wrapping them in Interface Definition Language interfaces and plugging them to the ORB using an object abstraction is well suited for the inherent autonomy and object-oriented characteristics of mobile code. Location transparency and the use of generic network addressing schemes (as are the opaque IOR handles) facilitates object mobility since the actual location of the objects is not important. More importantly yet, and for a variety of technical reasons, mobile code’s way to introduction in telecommunication environments needs to be paved by the previous introduction of distributed object technologies. Simply stated, CORBA’s, DCOM’s or RMI’s adoption will have the potential of transforming the telecommunication world into a more “permissive environment”, one in which mobile code will be more easily and naturally employed.

3 Realizing Distributed IN Systems In our design of a Distributed IN system we considered as a starting point the well defined IN conceptual model. We have aimed for an architecture that would allow a coherent and smooth transition from the classical, SS7 (Common Channel Signaling System 7) based, IN architectures towards open, CORBA based distributed ones. Towards this direction, new correspondences between Functional Entities (FEs) and Physical Entities (PEs) were defined, allowing the possibility to duplicate some FEs in heterogeneous systems. In particular, the Service Control Function (SCF) is used in both service control nodes and switching systems. In addition, the Specialized Resource Function (SRF) is integrated and combined with the SCF. As a result, 1

Implementation transparency however is a functional enhancement.

Distributed Intelligent Networks Based on Distributed Objects and Mobile Agents

491

advanced switching systems are introduced where SCP functions are added to the ones of a SSP, as well as Service Nodes, derived from the integration of SCPs with Intelligent Peripherals. An architecture implying a more loose mapping of functional entities onto physical ones, affords us the ability to locate SLPs indifferently in the switches systems or in the service nodes in a distributed manner. Mobile code’s role is critical as it gives objects the opportunity to roam through similar but remote FEs (as an example, a SCF located in a service control point and a similar one located in a switching system). Following this approach, the binding of objects to FEs contained in PEs is not static. Instead dynamic allocation can take place according to an observed pattern of service requests or in response to congestion or network failures. 3.1 Reference Architecture Based on the considerations of the previous section, the physical entities of the proposed architecture extend the traditional capabilities of the Service Control Points and the Service Switching Points. They are both required to adopt the following extensions: • Introduction of a CORBA ORB in the software platform • Capability to host mobile code downloaded from other network elements. Within our reference configuration, these systems are named Service Execution Nodes (SENs) and Broadband Service Switching and Control Points (B-SS&CPs) respectively. Figure 1 presents the reference configuration [8], [9]. In every element of the core network an Agent Execution Environment (AEE) is installed. This environment is composed of an ORB and the necessary components to provide the runtime capabilities of hosting, monitoring, interacting with and executing agents. The AEE is the key element that allows the distributed execution of the IN based services. In the classical IN the allocation of service logic and data is static. Within our approach, the adoption of distributed and mobile code technologies allows a responsive network reconfiguration on the basis of real time needs. Such needs can include those arising from situations of congestion or overloading in terms of processing or signaling load in some areas or during certain periods of time or from the characteristics of the services themselves. Services with a low rate of invocations can be stored and executed in the SEN. When a given threshold is overcome, the service logic and data can be downloaded in the B-SS&CPs reducing processing load on the SEN or signaling load along the BSS&CP – SEN connection. This behavior is completely transparent to the end users and to the call control software modules. Mobile code technologies are also introduced at the service design and deployment level. Using this approach, services are designed as Java-based Mobile Agents in appropriate Service Creation Environments (SCEs) and then transferred to the Service Execution Nodes utilizing the migration capabilities provided by mobile code platforms. The basic IN Application Protocol (INAP) semantics governing information flows between IN FEs are not affected however. Service providers can thus benefit from a flexible service provisioning environment, which enables them to adopt OO techniques for software design (minimizing the service development time)

492

M.K. Perdikeas et al.

and to make use of mobile code facilities in order to apply immediate and sophisticated policies for service release distribution, update and maintenance.

SEN

SCF

SMS

SRF

Repository

CC Wrapper GW

Call Control

AEE

M essaging Service

Nam ing Service

AEE

BEARER SIGNALING CORBA BUS TCAP

SSF AM

AEE

SSF CUSF

SCF

Traditional SSP SSF

CCF

CUSF

Call Control

CCF

Application

SS&CP

User Terminal

Infrastructure Agents (SLM, SSF-AM)

Service Logic Agents

Bottstrapping Agents

Resource Logic Agents

Fig. 1. D-IN Reference Architecture

3.2 The Service Execution Node The Service Execution Node is derived from the integration of the B-SCP and the BIP [10]. Additionally CORBA and a Mobile Agent platform are introduced which together play a key role in the service provision. The SEN initially enables the switch to access the IN agent-based services and provides an environment to locally execute the stationary or mobile agents that compose the services in case this can result in performance gains. It comprises the Service Control and Data (SCF/SDF), Mobility Service Control and Data (SCF/SDF), Specialized Resources (SRF), and Call Control Agent (CCAF) functions. The potential introduced by the introduction of distributed object and mobile code technologies is best exemplified when considering migration operations. The service logic programs are deployed as stationary or mobile agents and the latter can be distributed and executed among different physical entities. The architecture is open enough to allow for the use of SLPs implemented in a native language if stringent performance requirements are to be met. In the latter case the SLPs are stationary objects. An important property that is maintained with the imposition of various access points within the architecture is that the SCF cannot tell

Distributed Intelligent Networks Based on Distributed Objects and Mobile Agents

493

if it is interacted with a natively compiled SLP or a Java-based mobile code one. In fact the SCF is oblivious to the actual location of the SLP with which it communicates since the logic responsible for locating, accessing or downloading the SLPs is orthogonal with respect to the core SCF functionality. Several B-SS&CPs, some of which may generate a high number of service requests and consequently a high processing and communication load, can concurrently access a service in a SEN. A possible migration of the appropriate agents can improve network performance. Agent migration is also employed to support mobility management procedures, for example location registration/deregistration, user registration/deregistration, local authentication processing and so on. In these cases the mobile agents are more passive objects representing mobility management data and simply offer appropriate methods for accessing or modifying these data. Objects and Agents within SEN. The object model of the SEN considers three major parts. The fist parts contain the objects for the interaction of SEN with the B-SS&CP. The second part contains the core of the Service Logic and the third part contains the objects responsible for the SEN to user interaction. Figure 2 reports a high level view of the SEN architecture. SLP





Service Logic Manager



RLP

SSF Access Manager

SLM mobile part





INAP-CORBA Gateway

Specialized Resource Manager

User Interaction Manager

CORBA-based SSF INAP-based SSF

Fig. 2. High Level SEN’s object model

The SSF Access Manager is the SEN’s gateway object. All SSF-SCF interaction is passing through this object. When the system is bootstrapped SSF needs only obtain a CORBA reference at the SSF Access Manager. Technically it consists of two CORBA servers one for the SCF side (supporting SCF-initiated information flows) and one for the SSF side (for the SSF-initiated ones). The INAP information flows have been mapped into equivalent method invocations so for instance the SCF side

494

M.K. Perdikeas et al.

interface contains such methods as “DropParty”, “RequestReportSSMChange” and so on. The Service Logic Manager (SLM) is the core SCF entity. It is responsible for locating the SLPs for each particular service that is requested and for initiating migration procedures either triggered by the management system or by the migration criteria that are applied. The SLM is however not aware of any service-level details of the SLPs it manages. All its volatile data are embodied in its mobile part, which is created at the network management center and migrates on the SCF in order to attach to the stationary part. Since the interaction between the stationary and the mobile part is very intense, for performance reasons the interface between them is not based on CORBA but on Java. So these two objects hold direct pointers to each other allowing native method invocations between them. A similar approach has been adopted for all other mobile-stationary part pairs. The SEN, as far as UNI signaling is concerned, is viewed as a terminal. The Call Control Agent Function (CCAF), being the user side of the UNI signaling, provides access to the network resources. It interfaces with the CCF, which resides in the switch, and can either establish a new connection or accept an incoming one. The user invokes an IN service and afterwards the Service Logic connects the user terminal to the SEN, in order to elicit user input. Further service execution is significantly based on this info. The CCAF Wrapper, being a CORBA server, provides a CORBA interface to the signaling stack wrapping the call control functionality. This functionality is implemented in native code and can be viewed as a legacy component. This interface can provide a flexible way to establish new connections, to modify existing ones, to retrieve the total number or specific characteristics of each of the active ones. The CCAF Wrapper basically resolves each active session, based on a unique sessionID, to the connection. For this purpose the SessionId parameter is used to retrieve the VPI/VCI values (in the case of an underlying ATM broadband network) associated to a User-Plane connection. The SessionId is included in the Broadband High Layer Information (BHLI) information element of the Q.2931 SETUP message sent from the B-SS&CP (CCF) to the SEN (CCAF) [11]. The Specialised Resource Manager is a “hub” for containing volatile service and user related info. It can be used to contain user subscription and authentication information, information about available services, about service providers (e.g. video servers for the Information Retrieval service) or about FTP servers that host content raw data. The entire body of information contained in the Specialised Resource Manager is populated in the form of mobile objects that are dispatched there by the management center. An agent encapsulating content descriptive attributes (such as the location of the content server or the category that this new content should appear to user terminals) will be created at the management center. Then it will be instructed to migrate to the Specialized Resource Manager premises where using the Region Registry’s facilities he will attach natively to it (perhaps replacing in the process obsolete information). After this attachment has taken place, new users connected to the SRF and browsing through its catalogues for movies will find that movie available for selection. The User Interaction Manager (UIM) intermediates between the SLPs and the basic functionality of the IP. Exactly like the Service Logic Manager and the SSF Access Manager are the SLPs’ “connectivity” mediators to the SSF (and vice versa), the UIM is the SLPs’ mediator to the SRF. The interface between the SLPs and the

Distributed Intelligent Networks Based on Distributed Objects and Mobile Agents

495

User Interaction Manager is also based on CORBA. In this way all SLP references to their environment as well as the environment’s references to the SLPs are distributed allowing location transparent communication to take place. Belonging to the SCF, the UIM models the way the user interacts with the system for service selection and content preview/selection. It offers service-specific user interaction functionality. This functionality is implemented by the Resource Logic Programs (RLP). The RLPs contain the logic and processing capability to receive and send user information and convert information received from users. Each RLP is activated by the UIM after it has been invoked by the service logic and when the connection between the terminal equipment and the IP has been established. The RLP resumes the control of the service session for handling an userplane connection. While the RLP can actually use the established ATM connection, only if it knows the corresponding VPI/VCI pair, the service logic is aware only of the pertinent SessionId. This SessionID is sent to the CC signaling stack in the SETUP message. To provide service specific functionality, there should be one to one correspondence between the RLPs and the available services. Taking as an example the Interactive Multimedia Retrieval (IMR) service, the pertinent RLP is responsible for verifying which sub-service interests the user (e.g. video on demand, music on demand, news on demand) and enabling him to preview content from a variety of service providers. When the user interaction ends, the SLP retrieves the result (i.e. kind of sub-service, chosen service provider) and, after processing it (e.g. retrieving the physical address of the SP), instructs the establishment of one or possibly more physical connections between the user and the appropriate SP. At last but not least, the user interaction is not restricted to service specific context. The SRF can offer service-independent functionality, as well. This can include the authentication and the authorization of a user, the registration and de-registration for services and, in general, the interrogation and modification of the user profile. An alternative way to perform these operations is via the Call Unrelated Signaling Function (CUSF) implemented in the TE and interfacing with the CCF. However this way presupposes that the TE supports additional signaling stacks (Q.2932 in the broadband case) and that the corresponding information is encoded in “facility” Information Elements (IE) of the signaling messages. These IE are afterwards decoded by the service logic. Furthermore the updating/enhancement of the available user interaction scenarios when they are implemented via the SRF seems to be more flexible and user-friendly. In such case the Specialized Resources Manager is populated not only by agents bearing SP specific information but also user-specific in order to render more efficient the execution of the above mentioned operations. This way checking and updating profile, registering, authentication, authorizing can be provided locally in the IP. The implementation of RLPs is static. Another approach could be the implementation of the RLPs as a combination of static and mobile parts. The mobile service-dependent parts could migrate to the IP from a management center. This way the functionality of generic IPs, offering a service-neutral API, employed for playing announcements and collecting user info, could be enhanced and be service specific. Furthermore these mobile parts could migrate to the TE, however, the inevitable necessary enhancements of the TE software platform may overpower the potential added flexibility.

496

M.K. Perdikeas et al.

4 Conclusions The IN architecture represents an effective solution to the problem of providing advanced services to end-users. New software technologies which are becoming available allow to increase the efficiency of this architecture by enabling the distribution of services in the network and reducing bottleneck problems deriving from the use of a centralized architecture. In adopting distributed object technologies, the proposed architecture emphasizes the notion of Functional Entities engaged in a location transparent exchange of “Information Flows” between them (the concept on which the IN is based) and allows increased programmer’s productivity in the introduction of new concepts and services. Interoperability with traditional IN is also preserved by means of IN/CORBA bridges. Mobile code technology affords a greater flexibility in dynamically composing the network or parts of it at runtime and in keeping the infrastructure as generic (and thus as unlikely to need changes) as possible. Mobile code is also used to increase the robustness of the system and even to seek out and exploit performance gain opportunities in cases of intense remote interactions that could be made local. Overall, the combined distributed object / mobile code layer provides significant advantages to service design and management, allowing for high reutilization of components and for simplified schemes for release deployment and handling.

References 1. Magedanz, T., Popescu-Zeletin, R.: Intelligent Networks - Basic Technology, Standards and Evolution, Thomson Computer Press, ISBN:1-85032-293-7, London (1996) 2. Venieris, I.S., Hussmann, H. (eds): Intelligent Broadband Networks, John Wiley, ISBN: 0471-98094-3, Chichester (1998) 3. ITU-T Recommendations – Intelligent Network, Series Q.12xx, Geneva 4. OMG, CORBA/IIOP 2.3 Specification (1998), www.omg.org/docs/ptc/98-12-04.pdf. 5. Perdikeas, M., Chatzipapadopoulos, F., Venieris, I., Marino, G.: Mobile agent standards and available platforms, Computer Networks and ISDN systems 6. Breugst, M., Magedanz, T.: On the Usage of Mobile Agent Platforms in Telecommunication Environments, IS&N98, Antwerp (1998) 7. Perdikeas, M., Chatzipapadopoulos, F., Venieris, I.: An Evaluation Study of Mobile Agent Technology: Standardization, Implementation and Evolution, ICMCS '99 Florence – Italy 8. Venieris, I., Zizza, F., Magadanz M. (eds): Object Oriented Software Technologies: From Theory to Practice, J. Wiley & Sons, ISBN: 0-471-62379-2, Chichester (2000) 9. Chatzipapadopoulos, F., Perdikeas, M., Venieris, I.: Mobile Agent And CORBA Technologies In The Broadband Intelligent Networks, IEEE Communications Magazine, pp. 116-124, Vol.38, No. 6 (2000) 10. Prezerakos, G., Pyrovolakis, O., Venieris, I.: Service Node Architectures Incorporating Mobile Agent Technology and CORBA in Broadband IN, IEEE MMNS’98, France (1998) 11. ITU-T Recommendation Q.2931, Digital subscriber signaling system No. 2 (DSS2) – User Network interface (UNI) layer 3 specification for basic call/connection control (1995)

A New Cut-Through Forwarding Mechanism for ATM Multipoint-to-Point Connections 1

2

2

Athanasios Papadopoulos , Theodore Antonakopoulos , and Vassilios Makios 1

Computers Technology Institute, Riga Feraiou 61, 26100 Patras, Greece 2 Department of Electrical Engineering and Computers Technology, University of Patras, 26500 Rio Patras, Greece Tel: +30 (61) 997 346, Fax: +30 (61) 997 342, [email protected]

Abstract. This paper presents a new Cut-through forwarding mechanism for multipoint-to-point communications over ATM networks. Initially, we present the cell interleaving problem and a concise description of current ATM multicast proposals. Then, we present an improvement to existing Cut-through forwarding schemes for providing a good level of fairness among the connections competing for the available bandwidth of the output link, while maintaining good throughput performance. This scheme is referred as Conditional Cutthrough forwarding (CCT) and as simulation results show, it supports multipoint-to-point connections efficiently.

1 Introduction ATM networks use various operational modes, like unicast, broadcast and multicast in order to support different application requirements. Multicast serves as a communication abstraction, allowing message delivery to multiple destinations in a single step and thus reduces overall bandwidth consumption, helps control network traffic and decreases the amount of processing at every host. Efficient implementation of multicast is useful in many applications, such as distributed computing, parallel discrete event simulation (PDES) and multimedia applications. ATM multipoint communications have been studied at various international organizations, like ATM Forum and ITU. The Internet Engineering Task Force (IETF) also studies the mapping of IP multicasting to ATM networks [1], but direct ATM multicast service is still in its early phase of definition. The ATM User-to-Network Interface (UNI 3.1 or 4.0) signalling supports source-based tree approach with pointto-multipoint virtual channels (VCs) [2]. In current ATM implementations, AAL5 does not have any provision within its cell format for the interleaving of cells from different packets to a single connection. Therefore, point-to-multipoint connections are unidirectional, permit the root (a single source) to send data to the leaves (multiple destinations) but do not permit the leaves to transmit to the root on the same con-

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 497–506, 2001 © Springer-Verlag Berlin Heidelberg 2001

498

A. Papadopoulos, T. Antonakopoulos, and V. Makios

nection. In order to reduce the number of virtual connections maintained for each group, ATM switches must support multipoint-to-multipoint connections. The point-to-multipoint connections supported by UNI achieve multipoint-tomultipoint communication using either a centralized multicast server, or many pointto-multipoint VC connections in order to completely connect hosts in a mesh topology. Both of these approaches have efficiency limitations, since either they have to perform data retransmission (in the multicast server case), or they have to use many network resources in order to establish the required connections (in the case of overlaid VCs). In order to use multipoint-to-point connections, where many input links are mapped to an output link, we must solve the cell interleaving problem: when traffic is merged on a multipoint-to-point connection, cells that belong to packets from different sources use the same VPI/VCI and may interleave at the receiver site and the AAL5 entity cannot reassemble the data.

2 ATM Multicast Proposals AAL5 is the mostly employed ATM protocol. Several approaches have been proposed for solving the cell-interleaving problem over AAL5. These mechanisms include VC merging, VP switching, AAL5 modifications, use of resource management cells and the use of sub-channels within a VC. VC merging uses buffering of cells at the network switches and individual forwarding per packet. The MPLS (MultiProtocol Label Switching) and SEAM (Simple and Efficient ATM Multicast) proposals follow this technique. MPLS [3] implements a Store-and-Forward technique, while SEAM [4] aims to improve the performance of MPLS with a Cut-through forwarding algorithm. VP switching uses the VCI field to identify the sender and the VPI field to forward the cells. In schemes like DIDA (Dynamic IDentifier Assignment) [5], a value identifies the cells of a specific frame, while in the improved VP Switching proposal [6], the VCI identifies the sender, not the frame. Modifications of AAL5 add new fields in the cell for multiplexing or change the current fields of the cell header. Simple Protocol for ATM Multicast (SPAM) [7] inserts a 15 bits MID (Message Identifier) field in the cell payload to distinguish the cells coming from different senders. In the AAL5+ method [8], the MID field is 16 bits long and its value is assigned per packet by using a uniform probabilistic function. Other proposals use Resource Management (RM) cells. In SMART [9], a host must hold a token (control message) before it starts transmitting data to a tree. In CRAM [10], each group of cells belonging to the same sender is preceded by a Resource Management (RM) cell, which contains a number of Sender Identifiers. In the Sub-channel Multiplexing technique [11], 4 bits from the Generic Flow Control field in the ATM cell header are used to carry the multiplexing identifier (sub-channel ID) to distinguish between multiple sub-channels in a VC. All approaches require some modifications either to the ATM switches or to the edge devices. Some of them suffer from excessive overhead (SPAM, AAL5+) and

A New Cut-Through Forwarding Mechanism for ATM Connections

499

high complexity (SMART, CRAM). VPs should not be used by edge-devices (DIDA, Improved VP), because they are used for the accumulation of traffic in the backbone. Also, the sub-channel multiplexing technique is not very scalable, since only fifteen simultaneous senders can use the VC. Proposals based on Store-and-Forward and Cut-through algorithms (MPLS, SEAM) add small delay to data traffic [12], are scalable and simple to implement in order to support multipoint communications. As an additional benefit, these approaches can enhance intelligent discarding schemes (Early Packet Discard or Partial Packet Discard – EPD/PPD) by reducing the number of partial transmitted packets. This capability reduces further the wasted bandwidth since the EPD/PPD packet dropping policies reduce congestion and transmission of traffic that would inevitably be retransmitted [13]. 2.1 Cut-Trough Forwarding The Cut-through mechanism avoids the cell-interleaving problem in multipoint-topoint VCs by forwarding the first cell of a packet before receiving the End-of-Packet (EOP) cell, whenever the outgoing VC is idle and continues to transmit cells until the last cell of the packet. The ATM switch, which keeps separate buffers for each sender, has to buffer other incoming packets for the same outgoing VC, until the current packet has been forwarded completely. However, if a long packet from a slow source is forwarded or if the last cell has been lost, the delay increases, since cells belonging to other packets must wait in the input queues until the EOP cell of the first packet arrives, as shown in Figure 1. ATM Switch EOP cell

1

1

1

1 2

2

Input buffers Output buffer 2

2

3

3

1

1

1

Output link

Input links Fig. 1. Large packets from slow sources increase the delay in Cut-through forwarding

SEAM proposes a timer to overcome the loss of an EOP cell and the Store-andForward mechanism for slow links. But the value of timer is really critical and could significantly impact buffer lengths into switches. If the duration of the timer is too short, it would lead to an undesirable discard of good packets, and if it is too long, the delay of buffered packets would increase seriously. Additionally, slow links do not exploit the advantage of the cut-through mechanism, which is the immediate transmission of a new cell, and slow sources from faster links can still block the procedure. The modifications of the Cut-through discipline that are proposed by Stolyar in [14] do not solve these issues.

500

A. Papadopoulos, T. Antonakopoulos, and V. Makios

3 The Conditional Cut-Through (CCT) Forwarding Scheme The design goal of the Conditional Cut-through (CCT) forwarding scheme is to minimize the delay of buffered packets that is due to large packets from slow incoming links and sources or due to the loss of an EOP cell. In CCT, we define the variable “time in buffer” for each incoming packet. The variable “time in buffer” measures the number of arrived cells and is increased by 1, whenever a new cell arrives into the input buffer. When an EOP cell arrives into the buffer, the packet is marked as “Ready”. Then, the “time in buffer” has its maximum value and is equal to the total number of cells for that specific packet. It is obvious that each packet has its own “time in buffer”. When packets come from a source that generates cells at a rate less than the maximum supported rate (defined by the link speed), contiguous cells within a packet will be spaced by idle slots. We assume that the switch measures and stores the cell input rate for each partially forwarded packet and for every new packet that arrives into any empty buffer. Additionally, the switch measures and stores the mean and max values of the “time in buffer” for each input buffer separately. When the switch receives the first cell of packet X and if there are no cells from other sources queued or being forwarded, it directly forwards all cells on the output buffer without queuing. The switch copies each cell of the partially forwarded packet into a backup buffer. During the transmission of packet X, all the cells of a new packet Y arrive also into an empty buffer. Then, the switch will stop the packet forwarding and will start transmitting the new packet Y, if all the following conditions are satisfied: a. the “Ready” packet Y has less “time in buffer” than the current “time in buffer” of the partially forwarded packet X, Y R < XC b.

the “Ready” packet Y has arrived with higher cell input rate than X, CIRY > CIRX

c.

(1) (2)

the “time in buffer” of the current forwarded packet is less than the mean value of the corresponding input buffer, XC < Xmean

(3)

The switch transmits a “null cell” to indicate to the receiver that the previous cells have to be rejected. The stopped packet X is stored into the backup buffer until the EOP cell of packet arrives. Then, the switch transmits the packet X, irrespective of the status of other packets. If the transmission of a packet has been completed successfully, the next packet is selected by the “time in buffer” of the awaiting “Ready” packets. The switch compares all the first-in-buffer “Ready” packets among them. The packets with smaller “time in buffer” (smaller packets) have higher priority. The switch must transmit all the “Ready” packets from the results of the current comparison, before it moves on to a new comparison with new incoming “Ready” packets.

A New Cut-Through Forwarding Mechanism for ATM Connections

501

In case the previous conditions are not satisfied, the loss of an EOP cell could block the procedure. Then, if there is an input buffer Y with two or more “Ready” packets and their total “time in buffer” satisfies the condition: YR +YR+1+YR+2 +…> max {Xmax, Ymax}

(4)

then the first packet of this buffer will stop the forwarding action. According to Condition (4), where YR+1 is the “time in buffer” of the second incoming “Ready” packet in buffer Y, CCT gives to packet X enough time to be forwarded successfully, taking into account the case when the size of packets between two buffers differs significantly. When an EOP cell loss event occurs, the packet would be eventually discarded by switch. Consequently, the other input links are not blocked waiting for the output link to be released. A system using the CCT forwarding scheme is shown in Figure 2. We assume that packet 1 is currently being served and buffers 2 and 3 have no complete packets. Packet 1 is forwarded even though it has not arrived completely and it is copied into the backup buffer. During the transmission, the EOP cell of packet 3 arrives. According to the CCT algorithm, if conditions (1) to (3) are satisfied, the switch generates the “null cell” to indicate the rejected cells and it starts transmitting packet 3. EOP cell 1

ATM Switch 1

1

1

2

2

1

Input buffers Output buffer

2

1 3

3

Input links

1

1

1 2

1

2

1 1

Output link

Backup buffer

Input buffers Output buffer

2

1

Input links

1

Backup buffer

Input buffers

1 2

1 1 1

2

Output buffer 2

3

3

Input links

1 1 1 1

Backup buffer

1

1

Output link

3 3

1

1

Null cell 1 1

1

1

Output link

Fig. 2. The Conditional Cut-through (CCT) forwarding scheme

A generic flow chart for CCT forwarding scheme is shown in Figure 3. CCT gives higher priority to smaller packets from faster links or sources. The algorithm does not

502

A. Papadopoulos, T. Antonakopoulos, and V. Makios

wait the completion of packet X. Once the EOP cell of packet Y arrives, it compares the “time in buffer” values and the cell input rates for the two packets. If the conditions are satisfied, the switch stops the forwarding procedure and packet Y is transmitted to the output link immediately. Thus, the delay for packet Y is almost negligible. Output link idle Partially forwarded packet X. Copy packet in backup buffer.

The EOP cell of an awaiting packet Y arrives into the input buffer

Is the first "Ready" packet in buffer ?

True

False

Y R + Y R + 1 + Y R + 2 +... True > m a x { X m a x ,Y m a x }

YR < XC C IRY > CIRX X C < X mean

False

True

Stop forwarding action. Transmit the "Ready" packet.

False

Continue forwarding action. Store the "Ready" packet.

Next packet for transmission: the stopped or the smaller "READY" among input buffers

Fig. 3. A generic flow chart of the CCT algorithm

Whenever a Cut-through transmission begins, the switch calculates the cell input rate only for the partially forwarded packet and for the packets that arrive into empty buffers. After a successful transmission, the switch always checks the backup buffer if the stopped packet has been completely received. Thus, the CCT scheme does not add any additional delay to the stopped packet. The switch copies only the cells of the partially forwarded packet into the backup buffer. The goal is to resolve the fairness issue and to achieve better QoS support.

A New Cut-Through Forwarding Mechanism for ATM Connections

503

4 Comparative Results Simulations results are used to analyze the proposed method’s performance. We compare the effectiveness of the CCT scheme to the Store-and-Forward and other Cut-through mechanisms under homogeneous and heterogeneous input sources and links. The sources follow an ON-OFF model. OFF periods represent inter-packet generation time. We simulate a single switch with 5 input links and 1 output link. The fast recovery from slow arriving large packets is the most critical factor that characterizes CCT performance. Thus, we extensively investigate the impact of slow sources, the packet length and the load of slow links on the effectiveness of VC merging schemes. The simulation tool that was used for defining the most appropriate solution is Compuware’s COMNET III ® since it includes libraries for supporting Store-and-Forward and Cut-through mechanisms. Initially, all links are assumed to be of the same speed. We consider a data rate of 155.52Mbps for all input links. Also, the output link has the same speed. The packet length is a random variable uniformly distributed in the range (2, 30) cells and the total offered load would vary from 0.1 to 0.8. Since the average packet length is the same for all sources, OFF period determines the offered load. Figure 4 shows the average cell delay under various loading conditions when each source produces a cell at every time slot during the ON period. Cell delay includes storing time in the input buffer, the cell scheduling time and the transmission delay.

Average Cell delay (ms)

150 Store & Forward

120

Cut-through CCT

90 60 30 0 0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

Offered Load Fig. 4. Average cell delay versus network load under homogeneous sources

When the sources are homogeneous, CCT and Cut-through algorithms have almost the same behaviour. Cut-through performs slightly better since the CCT algorithm has the overhead of copying the cells of the partially forwarded packet into the backup buffer. However, when two of the sources generate the cells of a packet at the rate of 0.7 of link speed (slow sources), the results differ significantly, as shown in Figure 5. The packet length remains the same for all sources.

504

A. Papadopoulos, T. Antonakopoulos, and V. Makios

Average Cell delay (ms)

150 Store & Forward Cut-through

120

CCT

90 60 30 0 0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

Offered Load Fig. 5. Average cell delay versus network load when two of the sources are slow

In Figure 5, we see that the CCT algorithm has better response in all loading conditions. The delay due to Cut-through increases rapidly as the load increases and packets from slow sources block the procedure. CCT performs much better at high loads, since small packets are transmitted immediately. Figure 6 illustrates the average cell delay for different mean packet sizes under constant offered load (at 0.5). We assume that the average packet length for all sources would vary approximately 2 to 5 times the packet size used in Figure 5. We keep constant the minimum value of cells and we increase the maximum value. The two sources remain slower than the other sources.

Average Cell delay (ms)

150 Store & Forward Cut-through

120

CCT

90 60 30 0 15

30

45

Average packet size (cells)

60

75

Fig. 6. Average cell delay for different packet sizes

The results verify the effectiveness of CCT algorithm versus Cut-through when the packet sizes increase. Cut-through scheme depends directly on the length of incoming packets. As the packet size increases, the performance of Store-and-Forward and Cutthrough schemes decreases.

A New Cut-Through Forwarding Mechanism for ATM Connections

505

Finally, we consider that 2 of the inputs links are slow, having half the speed of the other input links and of the output link. We keep constant (equal to 0.1) the offered load of high-speed input links and we change the offered load of slow input links from 0.1 to 0.5.

Average Cell delay (ms)

120 Store & Forward Cut-through CCT

90 60 30 0 0.1

0.2

0.3

0.4

0.5

Offered load / slow link Fig. 7. Average cell delay versus utilization of slow links

In Figure 7, we see that under high load conditions at the slow links, the performance of CCT is much better that Cut-through. Further, we find out that Cut-through tends to follow the Store-and-Forward performance under high load conditions. Figure 7 shows the limitation of Cut-through to support slow-links and the effectiveness of CCT algorithm.

5 Conclusions In this paper, we described a simple and efficient solution to the cell-interleaving problem in multipoint-to-point connections. VC merging techniques are more scalable and simple to implement in order to support multipoint communications, but Cut-through forwarding results to waste of bandwidth if the subsequent cells of the partially forwarded packet are delayed. The design goal of the CCT algorithm is to minimize the delay of buffered packets that is due to slow arriving large packets or due to the loss of an EOP cell. The proposed scheme provides better performance in terms of delay, has low implementation complexity and does not require any modifications to the cells’ structure. The CCT scheme requires an additional buffer for each output link and increases its complexity slightly.

506

A. Papadopoulos, T. Antonakopoulos, and V. Makios

References 1. G.Armitage, “Support for Multicast over UNI 3.0/3.1 based ATM Networks, IETF RFC 2022, November 1996. 2. P.Samudra, “UNI signaling 4.0”, ATM Forum 95-1434, July 1996. 3. E.Rosen, A.Viswanathan and R.Callon, “Multiprotocol label switching architecture”, IETF Draft, , August 1999. 4. M.Grossglauser and K.K.Ramakrishnan, “SEAM: Scalable and Efficient ATM Multicast”, Proceedings of IEEE Infocom’97, pp.867-875, April 1997. 5. J.Calvignac, P.Droz, C.Basso and D.Dykeman, “Dynamic IDentifier Assignment (DIDA) for Merged ATM Connections”, ATM Forum 97-0504, July 1997. 6. R.Venkateswaran, C.Raghavendra, X.Chen and V.Kumar. “Support for Multiway Communications in ATM Networks”, ATM Forum 97-0316, April 1997. 7. S.Komandur and D.Mosse, “SPAM: A Data Forwarding Model for Multipoint-toth Multipoint Connection Support in ATM Networks”, Proc. of the 6 IC3N, September 1997. 8. F.Hoymany and D.Mosse, “More Powerful ATM Connectionless Support Using AAL5+”, Proceeding of IASTED Networks, January 1996. 9. E.Gauthier, J.Y.Le Boudec and P.Oeschlin, “SMART: A Many-to-Many Multicast Protocol for ATM”, IEEE Journal on Selected Areas in Communications, pp. 458-472, April 1997. 10. S.Komandur, J.Crowcroft and D.Mosse, “CRAM: Cell Re-labeling At Merge Points for ATM Multicast”, Proc. of IEEE ICATM’98, June 1998. 11. J.Turner, “Extending ATM Networks for Efficient Reliable Multicast”, Proceedings on Communication and Architectural Support for Network-Based Parallel Computing, February 1997. 12. I.Widjaja and A.I.Elwalid, “Performance Issues in VC-Merge Capable Switches for Multiprotocol Label Switching”, IEEE Journal on Selected Area in Communications, Vol.17, No.6, pp.1178-1189, June 1999. 13. A.Romanow and S.Floyd, “Dynamics of TCP traffic over ATM Networks”, IEEE Journal on Selected Area in Communications, Vol.13, No.4, pp.633-641, May 1995. 14. A.L.Stolyar and K.K.Ramakrishnan, “The stability of a flow merge point with noninterleaving cut-through scheduling disciplines”, Proceedings of INFOCOM’99, pp.12311238, March 1999.

Cell-by-Cell Round Robin Service Discipline for ATM Networks Hala M. Mokhtar, Rubem Pereira, and Madjid Merabti Distributed Multimedia Systems Group Liverpool John Moores University Byrom St., Liverpool, England, L3 3AF {CMSHMOKH, R.PEREIRA, M.MERABTI}@livjm.ac.uk

Abstract. Multimedia applications generate network traffic that requires stringent per-connection performance guarantees, in terms of throughput, delay, jitter and packet loss. To guarantee such performance requirements, the network must maintain two levels of control: connection admission control (CAC) at the connection level and service discipline at the packet level. In this paper we present a new service discipline for statistical, deterministic and best-effort services in ATM networks. This discipline, the Cell-by-Cell Round Robin (CRR), uses the round robin idea to provide fairness among the different users and isolation between them. We show that by guaranteeing a minimum service rate for a connection, its end-to-end delay can be bounded and greatly reduced. Moreover, fixed resources are needed at all nodes in the path from source to destination. This discipline achieves flexibility in supporting different QoS requirements, and provides a policing mechanism for misbehaving users and facilitates the pricing process.

1. Introduction Service discipline is a very important issue in integrated service digital networks. In a packet-switching network, packets from different connections will interact at each switch, requiring appropriate control. To achieve this, the service and scheduling disciplines at the switching nodes, which control the order in which packets are serviced, must be chosen very carefully. The Round Robin scheduling [1, 2] was proposed several years ago for packet switching networks. It has several advantages: it can provide fairness and isolation between connections. However, it does not take into account the variable size of the different packets. Moreover, it does not provide any performance guarantees. In this paper, we suggest a new service discipline, the Cell-by-Cell Round Robin (CRR), based upon the round robin idea for ATM networks, where all packets or cells have the same size. We describe two versions of the suggested scheme: a workconserving CRR and a non work-conserving one. We show that using the CRR service discipline in ATM environments has several advantages: it greatly reduces the end-to-end queuing delay to a single node worst-case queuing delay irrespective of the number of nodes in the path from source to destination. Unlike work-conserving disciplines, it results in allocating fixed amount of resources at all nodes in the P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 507–516, 2001 © Springer-Verlag Berlin Heidelberg 2001

508

H.M. Mokhtar, R. Pereira, and M. Merabti

network. Moreover, it provides a policing mechanism for misbehaving users and facilitates the pricing process. This paper is organised as follows: section 2 provides a brief review of related work in the literature. Section 3 describes the round robin service discipline for packet switching networks. Section 4 deals with round robin in ATM environment. The endto end delay bounds and resources needed in network environments are described in section 5. Details of the Cell-by-Cell Round Robin (CRR) for deterministic, statistical and best-effort services are given in section 6. In section 7, the connection admission control tests are described. Evaluation and benefits of using CRR in ATM environments are give in section 8.

2. Related Work Several service disciplines have been proposed in the literature. In general, we can divide them into three main types: FCFS, static priority and dynamic priority scheduling disciplines. The FCFS scheduler, which is used in most conventional networks, is the simplest. It may be capable of providing some performance guarantees (it can support only one delay bound for all streams), but only under a number of constraints and with a very inefficient use of network's resources [3]. A static priority (SP) [3] scheduler supports a fixed number of priority levels for connections, supporting a limited number of delay bounds. In addition, its exact admission test is computationally very complex. Dynamic priority schemes that aim to provide different qualities of service to different connections have been proposed. Examples of these schemes are Delay Earliest-Due-Date [4] and Stop-and-Go [5]. These solutions are based on either a time-framing strategy, or a sorted priority queue mechanism. In time framing schemes, it is difficult to support connections with both low delays and low throughput requirements efficiently since framing introduces dependencies between scheduling priority and bandwidth allocation granularity. A scheme based on sorted priority queue is difficult to implement in high speed network and requires a complicated schedulability test at connection establishment time [3].

3. Round Robin Service Discipline In 1987, Nagle [2] proposed a simple service discipline for packet-switching networks. In this scheme each connection has its own separate FIFO queue. The different queues are serviced in a round robin manner. This service discipline has several merits. It provides fairness among the different connections and isolation between them. It prevents the misbehaving users from degrading the service of the other clients. However, a drawback of this algorithm is that it does not take into account variable packet sizes. By combining smaller packets into one large packet and sending large packets, a user can gain an unfairly large fraction of the bandwidth compared with other users. Moreover, it doesn’t provide any performance guarantees.

Cell-by-Cell Round Robin Service Discipline for ATM Networks

509

Now, as Asynchronous Transfer Mode (ATM) networks, which have fixed packet size, are widely used, we would like to re-visit the idea of using the round robin service discipline in ATM based networks. A successful implementation would need to answer the following questions: 1. How can the round robin discipline guarantee the different performance requirements of the different connections? 2. What are the admission tests according to this service discipline? And what are the traffic descriptors required for these tests? 3. How can this discipline be implemented in ATM environment? 4. What are the benefits of using this discipline in ATM networks? In the next few sections, we will try to address these questions.

4. Round Robin in ATM Environment We suggest a new service discipline based upon the round robin idea for ATM networks where all packets or cells have the same size. We call it cell by cell round robin (CRR). In this scheme, each connection has its own separate FCFS queue. The different queues are serviced according to a pre-determined transmission order so that each connection has some weight according to its performance requirements. An important issue is how to choose this transmission order in such a way that guarantee the different performance requirements for all connections. On the one hand, if the weight of a connection is assigned according to its performance requirements (e.g. according to the delay bound), then the problem of the coupling between delay and bandwidth allocation granularity will occur so that connections with both low delays and low throughput requirements cannot be supported efficiently. On the other hand, if the weights are assigned according to the traffic characteristics (e.g. average and peak rates) the performance requirements can not be guaranteed. To avoid these problems, the order in which the different queues are serviced must depend on both the traffic characteristics and the performance requirements. One solution is to describe the traffic using the effective bandwidth and buffer-size needed to guarantee the performance requirements on a single-node basis, and to assign the weights according to these effective bandwidths. Now, if each connection is guaranteed its required effective bandwidth at a single switch, its performance requirements will be guaranteed. However, a single node analysis is needed to convert the performance requirements (delay bound, cell loss ratio) into required effective bandwidth and buffer-size notations. This is needed to avoid the dependencies between the bandwidth allocation and the required delay. Several stochastic per-connection effective bandwidth models are suggested in the literature [6, 7]. Few deterministic models based on a per-connection effective bandwidth notion exist [8]. However, it is possible to evaluate the required effective bandwidth and buffer-size using the different suggested deterministic traffic models. Moreover, a new deterministic model, which describes the traffic streams in terms of the minimum required bandwidth and buffer-size, is suggested in a sequel paper.

510

H.M. Mokhtar, R. Pereira, and M. Merabti

Throughout this paper, we assume that traffic streams are described using a perconnection required effective bandwidth and buffer-size; and these required resources guarantee the performance requirements on a single node basis.

5. Delay Bounds and Resources Required on a Multiple Node Basis The main idea behind using round robin in ATM networks is that each connection can guarantee a minimum required service rate. This provides fairness and isolation between traffic streams. It also simplifies the pricing process as the link capacity is plainly divided between connections. The major advantage is that if the technique is applied on a multiple-nodes network environment the worst-case end-to-end queuing delay is reduced to a single node worst-case delay. Moreover, the resources at all nodes are the same as those needed in the single node case. This is proved by the following result. Proposition 1: Provided that the following conditions are satisfied: • A variable bit-rate stream is characterised using a worst-case deterministic traffic model that is based upon calculating the required effective bandwidth and buffersize. • The effective bandwidth and buffer-size are calculated on a single node basis; i.e., the performance requirements are guaranteed if the stream is serviced at a rate greater than or equal to the effective bandwidth, and is allocated the required buffer-size at a single switch. • The stream is transmitted through a network (multiple node environment) and the same effective bandwidth and buffer-size are guaranteed to the stream; i.e., at all switches the stream is serviced at a minimum rate equal to the effective bandwidth and allocated its exact required buffer-size (irrespective of other streams multiplexed with it). Then, even if the scheduling discipline is work-conserving , the following holds: 1. The end-to-end queuing delay in the networking environment is equal to the worstcase queuing delay introduced by a single switch. 2. The buffer-size required in the following switches is the same as that required in the single switch; i.e., no more resources needed to compensate for the network load fluctuations at the different switches. Proof: A worst-case representation of any traffic may be described as follows. If the actual traffic of a connection is given by a function A such that A[τ,τ+t] denotes the traffic arrivals in the time interval [τ,τ+t], an upper bound on A can be given by a function * A if for all times τ ≥ 0 and all interval lengths t ≥ 0, the following holds:

Cell-by-Cell Round Robin Service Discipline for ATM Networks

A[τ,τ+t] ≤ A*(t)

511

(1)

*

We refer to function A (t) as a time invariant traffic constraint function. An * example A (t) is given in fig.1. If the single-node bound delay = dreq, then the effective bandwidth (ρ) can be calculated using the following equation: dreq = 1/ ρ * max( A (t) - ρt)

(2)

*

worst-case queue length = effective buffer-size = max(A (t) - ρt) *

(3)

cells

A*(t) r t

interval length (t) *

Fig. 1. The constraint function A (t)

If the stream is serviced at a rate greater than or equal to ρ and allocated the required buffer-size at all switches, we can evaluate the end-to-end queuing delay and the buffer size to be allocated in the following switches to ensure zero loss-rate. i. The end-to-end queuing delay Let ‘D’ denote end-to-end delay and ‘di’ denote delay at switch i, then: D = Σ di

(i=1,2,..m)

(4)

Where m is the number of nodes in the path between source and destination. Now we will analyse the traffic pattern after the first switch: st As the worst-case bound delay introduced by the 1 switch = dreq, then any cell st arriving at the 1 switch at time to can be delayed by no more than dreq; i.e., we can st assume that each cell in the output stream of the 1 switch has two limiting times: initial time and final time (to, to+dreq).

512

H.M. Mokhtar, R. Pereira, and M. Merabti

At the 1 switch, the connection is serviced by a rate greater than or equal to ρ, so we have three possibilities: 1. The connection is serviced at a rate equal exactly to ρ, so the bit-rate of the output stream is less than or equal to ρ, i.e the output peak rate equals ρ. If in the following switch, the connection is serviced with rate ≥ ρ (peak bandwidth allocation), there will be no need for buffering, no more queuing delay and the total nd queuing delay after the 2 switch will be equal to the worst-case delay introduced st by the 1 switch (d1+d2 = d1 = dreq). 2. The connection is serviced at a rate higher than or equal to its peak input rate, then the output stream will be identical to the input stream, and there will be no queuing st delay at the 1 switch. In this case the same analysis can be applied to the second switch and the total queuing delay after the second switch will be equal to the nd worst-case delay introduced by the 2 switch (d1+d2 = d2 = dreq) 3. The connection is serviced at a variable rate ≥ ρ so that some cells are transmitted without delay (still at their initial times), some reach their delay bounds (transmitted at their final times) and others are delayed by an amount less than their delay bounds (between their initial and final times). Let us consider this case in more detail: st According to the 1 possibility, if all cells reached their final times, a transmission rate = ρ at the next switch will not introduce any delay. This means that transmitting a cell every 1/ρ sec guarantee the transmission of all cells instantaneously without delay. Now, if some cells haven’t reached their final times, that means that they will arrive at the second switch before their transmission times (if they are served with rate ρ); i.e., they will be available in the buffer at their transmission time (every 1/ρ sec). This means that the maximum delay for any cell is bounded by its final time; i.e. the total queuing delay D after the second switch equals the worst-case delay at a single switch (d1+d2 = dreq). The same analysis can be applied to describe the traffic pattern after the different switches in the path between source and destination and the end-to-end delay can be proved to be equal to the worst-case delay at a single switch (D = dreq). st

ii. The buffer-size required at the different switches To find the required resources needed in the following switches, we must evaluate the * constraint function of traffic after the first switch (Ao (t)) as follows: The input stream is guaranteed a minimum service rate of ρ at the first switch, and the queue length at any time can not exceed the effective buffer-size. Then, the maximum number of cells that can be transmitted during any interval of length 't' can not exceed the effective buffer-size + ρt, else the queue length will exceed the effective buffer-size if it is serviced by a rate equal to ρ exactly. Then the maximum number of cells of the output traffic that can arrive at the * second switch during any interval of length t, Ao (t), is bounded by the value of the effective buffer-size + ρt. If the traffic is serviced with a rate ρ at the second switch, the maximum queue length will be equal to the same effective buffer-size used at the first switch, which

Cell-by-Cell Round Robin Service Discipline for ATM Networks

513

means that the same resources are needed at the second switch for the same performance requirements. Similarly, we can evaluate the constraint function after the different switches in the path between source and destination and prove that the resources needed at the different switches are the same as those needed at a single switch.

6. CRR Service Discipline CRR provides a minimum service rate for each connection equal to its effective bandwidth. To achieve this, at each node, each connection has its own separate queue. Each queue has an identifier and is serviced in a FCFS fashion. The scheduler serves the different queues according to a pre-determined transmission order based upon the weights or the effective bandwidths of the different connections. This order is saved in a vector of queue identifiers according to the sequence at which the different queues must be serviced. The vector length is equal to the link capacity expressed in cells/sec. On the transmission of a cell, the server interrogates a pointer to the vector to know the following queue identifier and transmits a cell from the chosen queue. Each queue identifier of a connection is assigned to a number of vector elements equal to the required effective bandwidth of this connection expressed in cells/sec. At the establishment phase, a new connection specifies its required effective bandwidth (in cells/sec) and buffer-size. A simple admission test to check the available bandwidth (in cells/sec) and buffer-size will run. If the connection is admitted, it will be allocated its effective buffer-size and assigned to a particular queue identifier. At each node, a number of elements in the vector equal to the required bandwidth are assigned to its queue identifier. To choose the elements of the vector that must be assigned for a certain connection: The elements numbers = ( k*abs(link capacity/required bandwidth)) k=0,1,…, req. BW –1

(5)

If the element is already occupied, the nearest empty element is chosen. The server will access the queues according to the vector sequence. After the last element, the pointer wraps around to the first element in the vector and the process is repeated continuously. However, the vector element may equal ‘0’ which means that no particular queue is to be serviced or the chosen queue may have no cells. In this case we say that the scheduler has a spare service. We suggest two versions of CRR: a work-conserving version and a non work-conserving version. These two versions differ in the action that must be taken in case of a spare service. Details of the two versions will be given in the following sections. In general, each node in the network must maintain three kinds of queues: deterministic, statistical and best-effort queues according to the required kind of service. Best-effort queues can have only spare service. At the termination of a connection, its allocated buffer is freed and its elements in the vector are set to zero.

514

H.M. Mokhtar, R. Pereira, and M. Merabti

6.1 Work-Conserving Version In the work-conserving version, deterministic, statistical and best-effort queues can have spare service. There is only one pointer to the vector. This pointer always points to the queue that must be serviced. In case of a spare service, the pointer moves to the next element in the vector and the corresponding queue is serviced. 6.2 Non Work-Conserving Version It is better for deterministic streams to be serviced in a non-work conserving manner, because deterministic traffic descriptors are based on a worst-case assumption; i.e. they do not need any addition of spare service. If the deterministic queues are serviced at a rate equal exactly to their effective bandwidths at the user network interface (UNI) node, the peak-rate of the traffic after the first switch will be equal to the effective bandwidth so that no more buffering is needed in the following switches. In non work-conserving, the deterministic queues can not have a spare service. A spare service can be provided to statistical and best-effort queues only. To achieve this two pointers are used at each node: a primary pointer moves regularly between the successive elements of the vectors; and a secondary pointer to point at the queue that must be chosen for a spare service only. The primary can point to deterministic or statistical queues while the secondary points to statistical queues only. This ensures fair spare service since the spare statistical queues are chosen according to the same order in the vector. At the UNI nodes, each deterministic connection has its own queue that will be serviced at a rate equal exactly to its effective bandwidth since only statistical and best-effort queues can have spare service. This will police and smooth the traffic pattern so that the peak rate of the output traffic will be bounded by the effective required bandwidth and no further buffering is needed in the following switches. For the NNI nodes, the only difference is that instead of using several deterministic queues, there is just one deterministic queue and one buffer of ND cells for all deterministic connections (where ND is the number of deterministic connections). This buffer is needed for the instantaneous arrival of cells from different connections. A number of vector elements equal to the sum of the required bandwidths for all deterministic connections is assigned to the deterministic queue, and the deterministic queue is never served unless plainly mentioned in the vector.

7. Admission Control Tests and Traffic Descriptors Concerning the admission control tests, at the establishment phase, the new connection indicates the required type of service (deterministic or statistical), the required effective bandwidth and the buffer-size. According to the required type of service, the tests required are as follows: • For work-conserving version, all the nodes in the path from source to destination check if the available bandwidth and buffer-size are greater than or equal to the required ones.

Cell-by-Cell Round Robin Service Discipline for ATM Networks

515

• For non work-conserving version: - For deterministic service, the UNI node checks if the available bandwidth and buffer-size are greater than or equal to the required ones, while the other NNI nodes check the available bandwidth only. -For statistical service, all the nodes in the path from source to destination check for both the available bandwidth and buffer-size.

8. Evaluation and Benefits of Using CRR in ATM Networks To evaluate CRR, we will consider the common goals of service disciplines, namely protection from misbehaving users, efficiency, protection from network load fluctuations, flexibility, simplicity of implementation and of admission tests. Providing each connection with a minimum rate, CRR provides isolation among connections. If a user sends packets in a higher rate, he merely increases his own queue length. CRR is an efficient scheme. It has two versions: a work-conserving and a non work-conserving. However, even in the non-work conserving version the only case in which the server is idle is when there are only deterministic queues to be serviced in a rate higher than their allocated bandwidth. Actually, this is not required for a deterministic service since its performance requirements are guaranteed anyway. CRR benefits from the effect of switches in smoothing the traffic so that the required bandwidth becomes less than the peak one. For deterministic services, in the non work-conserving version, not only the required buffering does not increase, but also it is approximately eliminated. For statistical service, although the traffic pattern may change, the required buffer size in the following switches does not increase. CRR is a flexible scheme. It gives the users all the flexibility they need to choose any performance requirements. CRR is a simple scheme. The only difficulty with CRR is that it requires buffering on a per connection basis. However, it avoids the service arbitration problems: no complex computations or queue sorting are needed. The admission tests for CRR are just to check the available bandwidth and buffersize. The traffic parameters needed are easily obtainable. Other important advantages are the major reduction in the end-to-end worst-case queuing delay (equal to a single switch worst-case queuing delay) irrespective of the number of nodes in the route from source to destination, and the fixed resources needed at the different switches in the network.

9. Conclusion We have proposed a CRR service discipline for deterministic, statistical and besteffort services in ATM networks. This discipline provides isolation between connections by guaranteeing a minimum service rate for each one. We suggested two versions of CRR: a work-conserving CRR and a non work-conserving one. We showed that using CRR in ATM networks has several advantages. The CRR discipline can provide throughput, delay, delay-jitter and loss-rate guarantees for real-

516

H.M. Mokhtar, R. Pereira, and M. Merabti

time traffic streams. It achieves flexibility in supporting different QoS requirements, efficiency in using network resources and simplicity of admission control tests. It provides isolation between the different connections and fairness among them. Most importantly, it reduces the end-to-end queuing delay to the worst-case delay introduced by a single switch. The CRR service discipline was evaluated and it was shown that it achieves the most important aims of QoS service disciplines. We have developed a traffic model to be used in conjunction with CRR scheduling, which will be presented in a sequel paper.

References 1. J. Nagle, "On Packet Switches with Infinite Storage," RFC 896, 1985 . 2. J. Nagle, "On Packet Switches with Infinite Storage," IEEE Trans. on Communications, April 1987 ,Vol. 35(4): p. 435-438. 3. H. Zhang and D. Ferrari, "Rate-Controlled Static-Priority Queueing," Proceedings of INFOCOM'93, San Francisco, CA, April 1993 . 4. D. Ferrari and D. C. Verma, "A Scheme for Real-Time Channel Establishment in Wide-area networks," IEEE Journal on Selected Areas in Communications, Apr. 1990 ,Vol. 8(3): p. 368-379. 5. S. J. Golestani, "A Stop-and-Go Queueing Framework for Congestion Management," In Proceedings of ACM SIGCOMM'90, Philadelphia, Pennsylvania, Sep. 1990 : p. 8-18. 6. A. I. Elwalid and D. Mitra, "Effective Bandwidth of General Markovian Traffic Sources and Admission Control of High Speed Networks," IEEE/ACM Trans. Networking, June 1993 ,Vol. 1(3): p. 329-343. 7. C. Chang and J. A. Thomas, "Effective Bandwidth in High-Speed Digital Networks," IEEE Journal on Selected Areas in Communications, Aug. 1995 ,Vol. 13(6): p. 1091-1100. 8. H. Mokhtar, R. Pereira, and M. Merabti, "Resource Allocation Scheme for Deterministic Services of Video Streams," accepted for publication in ISCC'01, July 2001 .

Delay and Departure Analysis of CBR Traffic in AAL MUX with Bursty Background Traffic Chul Geun Park1 and Dong Hwan Han2 1

Department of Electronics, Information and Communications Eng. Sunmoon University, Asan-si, Chungnam, 336-708, Korea [email protected] 2 Department of Mathematics Sunmoon University, Asan-si, Chungnam, 336-708, Korea [email protected]

Abstract. This paper models and evaluates the AAL multiplexer to analyze delay and departure distributions of CBR traffic in ATM networks. We consider an AAL multiplexer in which a single periodically deterministic CBR traffic stream and several variable size bursty background traffic streams are multiplexed and one ATM cell stream goes out. We model the AAL multiplexer as a B X + D/D/1 queue and analyze departure process of CBR cells by using queueing model. We represent the cell delay distribution and the cell interdeparture time distribution.

1

Introduction

The use of Asynchronous Transfer Mode (ATM) as the key transport technique for B-ISDN networks has motivated engineers to study ATM systems by using the queueing model. Many papers[1,2] have studied the queueing model of ATM MUXs (multiplexers) to analyze the ATM layer protocol. But it has been uncommon to make a study on the analysis of the ATM Adaptation Layer (AAL) protocol[3]. It has been also uncommon to make a study of queueing model of the AAL MUXs in order to analyze the Cell Delay Variation (CDV) of a cell stream. In this paper, we model and evaluate the AAL MUX to analyze the AAL protocol and CDV of a delay sensitive traffic stream in ATM networks. We concentrate on the performance measures of both packet-level (AAL) and celllevel (ATM). There are two packet streams entering the AAL MUX. The first one is a fixed size periodic and delay sensitive Constant Bit Rate (CBR) traffic stream while the other is bursty background traffic stream. This system is modelled as a single First In First Out (FIFO) MUX. This system is applied to the Video on Demand (VoD) service using a CBR transport stream with the background traffic such as Internet Protocol (IP) and signaling data packets from other connections[4]. Periodically arriving CBR transport packets are multiplexed with data packet from other connections. The passage of a packet across the AAL is modelled as a bulk arrival of cells due to the segmentation process in the AAL. The number P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 517–526, 2001. c Springer-Verlag Berlin Heidelberg 2001 

518

C.G. Park and D.H. Han Transport packets Bursty stream

✂✌✂ 0 1 2

···

T



✁✂ ✁✂ ✁✂ ☛✂ ✁ ✂ ✂



✲ 2T

48byte ATM cell payload

❍ ❍

❍❍

❍ ❍









✟✟

❍❍ ✟ ✟✟ ✟

B X + D : superposed process CBR stream Figure 1. Input traffic and queueing model of AAL MUX

of cells in the bulk is determined by the packet size in cells. The outgoing cells of AAL segmentation process are passed to the ATM layer. The segmentation processing time devoted to each cell corresponds to the segmentation algorithm and requires several ATM cell time[5], which is represented by the service time S in the queueing model of the AAL MUX. We consider an AAL MUX in which a single CBR stream (D : deterministic process) and several variable size bursty traffic streams (B X : batch Bernoulli process) are multiplexed and one ATM stream goes out. Thus we can derive a B X + D/D/1/∞ queueing model for illustrating the cell departure process of AAL MUX in order to analyze the CDV of CBR traffic. The overall organization of this paper is as follows. In the section 2, we describe the input traffic and system model of the AAL MUX. In the section 3, we analyze the system by using an MMBBP/D/1 queue, where the Markov Modulated Batch Bernoulli Process (MMBBP) is a superposition of bursty background traffic and deterministic CBR traffic[6]. In the section 4, we obtain the waiting time distribution of a CBR cell. In the section 5, we represent cell delay time and cell interdeparture time distribution. In the section 6, we take some numerical examples for the performance measures of our queueing model. Finally, we have a conclusion in the section 7.

2

Input Traffic Model and System Model

Periodically arriving CBR traffic streams are multiplexed with signaling, ABR, or UBR traffic stream from other connections. On many ATM interface cards, the multiplexing effects in AAL MUX should be considered. We consider an AAL level MUX in which a single CBR (D) stream and several variable size bursty traffic (B X ) streams are multiplexed and one ATM cell payload stream goes out. We derive a B X + D/D/1 queueing model for the evaluation of delay and delay variation experienced by the CBR stream (see Fig. 1). We consider a system model that operates on a discrete time basis. Time is divided into intervals (called slots) which are equal in length (a cell transmission

Delay and Departure Analysis of CBR Traffic in AAL MUX

519

time). Integer times n ∈ {0, 1, 2, · · · } are assigned to individual slot boundaries. We assume that packets of a bursty traffic streams arrive in various batch sizes of cells just prior to the end of slot boundaries and packets of a single CBR stream arrive in a constant batch size d of cells in each period T such that the interarrival time is always equal to T . The two cell streams are assumed to be independent. Let Bn denote the number of cell payloads of the bursty stream arriving just prior to the end of the n-th slot, that is, arrival batch size at time n. Then the bursty stream can be modelled by a batch Bernoulli process, that is, in each time slot n, arrivals occur in independent and identically distributed batches of size Bn with a common distribution bk = P {Bn = k}. We define B(z) by the probability generating function (PGF) of the distribution bk . Now, to describe the superposition of a bursty stream and a CBR stream, we assume that the superposed input process is a doubly stochastic point process in which the number of arriving cells depends on the underlying arrival phase process. The arriving phase for each slot varies on the states {1, 2, · · · , T }. Let Yn denote the arrival phase of the n-th slot. It then follows that Yn forms a discrete time Markov chain having state space {1, 2, · · · , T }. The arrival process of the superposed input process and the underlying Markov process are assumed to be independent of each other. Let Xn denote the number of cells arriving from the superposed process at time n. Then this input process {(Yn , Xn )}, which is called an MMBBP, is characterized by the transition matrix P and the arrival matrix Λ(z) of the superposed process     B(z) 0 · · · 0 0 0 1 0 ··· 0  0 B(z) · · · 0 0 0 1 · · · 0  0       ..  .. .. .. . . ..  ..  . . . . . . .. .. P =  . . . . .  , Λ(z) =  . (1) .       0  0 0 0 · · · 1  0 · · · B(z) 0 1 0 0 ··· 0 0 0 · · · 0 z d B(z)

3

Queueing Analysis of AAL MUX with Infinite Buffer

In this section, we return our attention to the queueing situation where a single server system operates on a discrete time basis. We consider a discrete time single server queue with MMBBP input, infinite buffer and constant service time S. The buffer receives cells according to a process modelled as an MMBBP, giving rise to an MMBBP/D/1 queue. Let J(t) be the phase of the MMBBP and N (t) be the number of arriving cells during the time interval (0, t] respectively. We denote the transition probabilities of the process {(N (t), J(t)), t ≥ 0} by Pjj1 (k, t) = P {N (t) = k, J(t) = j1 | N (0) = 0, J(0) = j}, and we denote P (k, t) as the T × T matrix of the probabilities Pjj1 (k, t). Then P (k, t) has the PGF as follows P˜ (z, t) =

∞  k=0

P (k, t)z k = [P · Λ(z)]t , |z| ≤ 1,

520

C.G. Park and D.H. Han

where P and Λ(z) are given in (1). Let Q(t) be the number of cells in the data buffer at time t and let tn be the n-th embedded (just after departure) point. Let Qn = Q(tn +) and Jn = J(tn +) be the state (level) of the queueing system and the phase of the MMBBP just after tn , respectively. Then {(Qn , Jn ), n ≥ 0} forms a Markov chain with state ˜ space {0, 1, 2, · · · } × {1, 2, · · · , T }. The one step transition probability matrix Q is given by  ∗ ∗ ∗ ∗ ∗  C0 C1 C2 C3 C4 · · ·  C0 C1 C2 C3 C4 · · ·    ˜= Q  O C0 C1 C2 C3 · · · ,  O O C0 C1 C2 · · ·   .. .. .. .. .. . . . . . . . . where Ck = P (k, S), k = 0, 1, 2, · · · , and O is a T × T matrix with all zeros. Now we must find the probability matrix Ck = P (k, S), k = 0, 1, 2, · · · . To do this, we define the matrices R1 and R2 as follows   O I1 O O2 R1 = , R2 = , O1 O I2 O where the block I1 is a (T − S) × (T − S) identity matrix, O1 is an S × S zero matrix, the block I2 is an S × S identity matrix, O2 is a (T − S) × (T − S) zero matrix, and the blocks O s are zero matrices. Let Ii,j be the T × T matrix with all entries zeros except (i, j)-entry one. Then, we can find Ck , k = 0, 1, 2, · · · , entries as follows

(S) k ≤ d − 1, (R1 − IT −S,T + IT,S ) bk , Ck = (S) (S) (R1 − IT −S,T + IT,S ) bk + (R2 − IT,S + IT −S,T ) bk−d , k ≥ d, where the superscript means the S-fold convolutions of the batch size distribution. To find Ck∗ , k = 0, 1, 2, · · · , let A(z) be a PGF of {Ak } as follows A(z) = [I + P Λ(0) + (P Λ(0))2 + · · · + (P Λ(0))T −1 ] P [Λ(z) − Λ(0)],

(2)

where the term (P Λ(0))k P [Λ(z) − Λ(0)], k = 1, 2, · · · , T − 1, means that the first arrival to empty system occurs at time k + 1, given that the idle period started time 0. Then the matrix Ck∗ , k = 0, 1, 2, · · · , can be obtained from Ck∗ =

k+1 

Al Ck−l+1 , k = 0, 1, 2, · · · .

l=1

˜ let πi,j be the To find the steady-state probability vector π of the matrix Q, limiting probability of (Qn , Jn ), n ≥ 0, that is, for i = 0, 1, 2, · · · , 1 ≤ j ≤ T , πi,j = lim P {(Qn , Jn ) = (i, j)}, n→∞

Delay and Departure Analysis of CBR Traffic in AAL MUX

521

and let π = (π0 , π1 , π2 , · · · ) with πi = (πi,1 , πi,2 , · · · , πi,T ). Then the steady-state probability vector π at embedded points is obtained by the equations ˜ = π, πe = 1, πQ where e is a column vector with all ones. Let G be a matrix satisfying the following equation G=

∞ 

Ck Gk .

k=0

Then we have the unique solution of g = gG, ge = 1, which is the invariant vector of the irreducible stochastic matrix G [7]. We denote K be the matrix satisfying the following equation K=

∞ 

Ck∗ Gk ,

k=0

and κ be the invariant vector of K such that κK = κ, κe = 1. In evaluating πi , i = 0, 1, · · · , there is a small advantage in denoting the vector u ˜ 1 by u ˜ 1 = [I − C + (e − β)g]−1 e, where C ≡

∞ k=1

Ck = R1 + R2 and β ≡

∞ k=1

(3)

kCk e. To find π0 , we introduce two

˜ 1 in (3), vectors φ1 and φ2 for simplicity, by using u

∞  ˜ 1 + (1 − ρ)−1 C0 e, Ck Gk−1 u φ1 = I − C0 − φ2 = e +

k=1 ∞  k=1

Ck∗ −

∞ 

˜ 1 + (1 − ρ)−1 Ck∗ Gk−1 u

k=1

∞ 

(k − 1)Ck∗ e.

(4)

k=1

We now define κ ˜ 1 by the same matrix as [7]. Then we can express κ ˜ 1 in terms of the vectors φ1 and φ2 in (4) as follows

−1 ∞ ∞   ∗ k−1 k−1 I− Ck G Ck G φ1 . κ ˜ 1 = φ2 + k=1

k=1

Thus the vector π0 is given by κ1 )−1 κ. π0 = (κ˜ Once the vectors π0 is known, it is possible to determine also the vectors πi , i ≥ 1, by using the following equation

i−1  ∗ ¯ ¯ πi = π0 Ci + πk Ci−k+1 (I − C¯1 )−1 , i ≥ 1, k=1

where C¯i∗ =

∞ k=i

∞ Ck∗ Gk−i , and C¯i = Ck Gk−i , i ≥ 0. k=i

522

4

C.G. Park and D.H. Han

Derivation of the Waiting Time Distribution

We assume that (Qt , Jt ) ≡ (Q(t), J(t)), t ≥ 0, is stationary. We will find the stationary distribution of (Q(t), J(t)) at an arbitrary point. Let xk,j = P {(Q(τ ), J(τ )) = (k, j)}, k = 0, 1, 2, · · · , 1 ≤ j ≤ T, and x = (x0 , x1 , x2 , · · · ) with xk = (xk,1 , xk,2 , · · · , xk,T ), k = 0, 1, 2, · · · . By the same manner as in Yegani[8], we can find the stationary probability vector x. To find the stationary probability vector x, let the random variable η be the steady state of server, namely η = 1 if the server is busy and η = 0 if the server is idle. Then the probability of the system being busy is given by S . S + π0 [I − P Λ(0)]−1 e In addition, we have the stationary distribution xk with η1 as follows η1 ≡ P {η = 1} =

xk =

k S−1 η1   (π0 Am + πm )P (k − m, t), k = 1, 2, · · · , S m=1 t=0

where Am is given in (2) and P (k, 0) = δk0 I. On the other hand, the vector x0 satisfies π0 [I − P Λ(0)]−1 . x0 = S + π0 [I − P Λ(0)]−1 e By Little’s low, the mean cell delay E[WC ] for an arbitrary cell is given by ∞ kxk e ∞ S = kxk e. E[WC ] = k=1 B (1) + d/T ρ k=1

To obtain the distribution of the waiting times W2C and W2P of a CBR cell and a CBR packet in the system, respectively, let consider a cell arriving at time τ and take the service interval [tl , tl+1 ) containing τ . We define the joint distributions by γj (k, t) ≡ P {Q(τ ) = k, J(τ ) = j, Sf = t | η = 1}, where Sf is the remaining service time at time τ . Then we find the waiting time W2q of the first cell of the CBR stream in the queue except service time as follows

T (x0,T −1 + η1 γT −1 (1, 1)) , w = 0,  w  w  P {W2q = w} = (5) η1 T γT −1 S + 1, w − S S + 1 , w ≥ 1. where [x] is the Gaussian integer. So we can find P {W2q = w} by γj (k, t) in the same manner as [8]. The distributions of W2C and W2P are given by d

P {W2C = w} =

1 P {W2q = w − iS}, d i=1

P {W2P = w} = P {W2q = w − dS}.

Delay and Departure Analysis of CBR Traffic in AAL MUX

523

Then we can derive the mean cell delay E[W1C ] for an arbitrary cell of the bursty stream from   d d 1  E[WC ] − E[W2C ] . B (1) + E[W1C ] =  T T B (1)

5

Interdeparture Time Distribution of CBR Traffic

In this section, we derive the interdeparture time distribution of CBR stream. Let the time interval [n − 1, n) be referred to as the n-th slot. Consider the time epoch n as the right boundary of the n-th slot and let U (n) be the unfinished work at time n. We let J(n) have the same interpretation as in the previous section. Then U (n+) and U (n−) mean the unfinished works just after time n and just prior n, respectively. We note that U (n−) is equal to the waiting time of CBR packet in the queue W2q (n) at time n. In this section, we expend the definition of the common distribution bk = P {Bn = k} as follows

0, i/S = 0, 1, 2, · · · , bi/S = bk , k = i/S = 0, 1, 2, · · · . From the definition of U (n−) and bi/S , we have, for 1 ≤ m ≤ T , (m−1)

P {U (n−) = k | J(n) = T, U ((n − m)+) = i} = b(k−i+m)/S , i ≥ m, P {U (n−) = k | J(n) = T, U ((n − m)+) = i}, 0 ≤ i ≤ m − 1. At the first step, we have P {U (n−) = k | J(n) = T, U ((n − 1)+) = 0} = δk0 . For m = 2, 3, · · · , T, i = 1, 2, · · · , m − 1, and i = 0 we have P {U (n−) = k | J(n) = T, U ((n − m)+) = i} ∞  (i) = bl P {U (n−) = k | J(n) = T, U ((n − m + i)+) = lS}, l=0

P {U (n−) = k | J(n) = T, U ((n − m)+) = 0} =

m−1 ∞ 

P {U (n−) = k | J(n) = T, U ((n − m + i)+) = lS}bi−1 0 bl

i=1 l=1

+ P {U (n−) = k | J(n) = T, U ((n − 1)+) = 0}bm−1 . 0 Thus we have obtained the conditional probability that the unfinished work just prior n equals to k, k = 0, 1, 2, · · · , given that the unfinished work just after n − m equals to i, i = 0, 1, 2, · · · . To find the interdeparture time distribution of CBR stream, we must find the joint probability P {W2q (n − T ) = i, W2q (n) = k}

524

C.G. Park and D.H. Han

that the waiting times of CBR packets in the queue are i at time n − T and k at time n, respectively. To find the above joint probability, we have P {W2q (n) = k | W2q (n − T ) = i} = P {U (n−) = k | W2q (n − T ) = i} ∞  = bl P {U (n−) = k | J(n) = T, U ((n − T )+) = i + (d + l)S)}.

(6)

l=0

We denote DP as the interdeparture time distribution of CBR packet. Then by the definition of W2q and the equations (5) and (6), we have P {DP = v} =

∞ 

P {W2q (n − T ) = i, W2q (n) = i + v − T }.

i=0 i+v−T ≥0

Finally, we have the interdeparture time distribution DC of CBR cells,

d−1 v = S, + d1 P {DP = dS}, P {DC = v} = 1 d d P {DP = v + (d − 1)S}, v > S.

6

Numerical Results

In this section, we present some numerical results to show the mean delay in the basis of cell and packet. We take the CBR packet of T = 15 cell times, the service time S = 3 cell times for segmentation, and the batch size d = 2 of a CBR packet(a packet is segmented by 2 cells), respectively. Therefore the arrival rate of CBR traffic is λC = 2/15 and the service rate is 1/S = 1/3. In the case of the bursty background traffic, we take bk = P {Bn = k} ∼ B(15, a) as the k 15−k batch size distribution of bursty traffic, that is, bk = 15 , then the k a (1 − a) mean arrival rate of the bursty traffic becomes λB = 15a in cell. After all, we have the traffic intensity of ρ = (15a + d/T )S = 3(15a + 2/15). In Figure 2, we show the effect of traffic load on the mean delay. We denote E[W1C ], E[W2C ] and E[WC ] as the mean cell delay of bursty traffic, that of CBR traffic and an arbitrary cell, respectively. As the traffic(in precise the bursty traffic) load increases when CBR traffic load is fixed, the mean cell delay of CBR traffic increases. This fact shows that the mean waiting time of CBR traffic depends on the background bursty traffic. In this section, we assume that CBR traffic load is fixed. Since the CBR traffic is sensitive to delay, the heavy load of bursty traffic gives a negative effect on the QoS of CBR traffic. In Figure 3, we give the effect of traffic load on the mean delay of CBR traffic. We denote E[W2P ] as the mean packet delay of CBR traffic. The packet waiting time W2P is the sojourn time in the system until the last cell of a packet departs the system and the cell waiting time W2C is the sojourn time in the system until an arbitrary cell of a packet departs the system. Since the service

Delay and Departure Analysis of CBR Traffic in AAL MUX 16

525

18

EW1C EW 2C EWC

14

EW 2C EW2P

16

14 12

Mean cell delay

Mean cell delay

12 10

8

10

8 6 6

4

4

2 0.5

0.55

0.6

0.65

0.7 0.75 Traffic intensity ρ

0.8

0.85

0.9

2 0.5

0.95

Figure 2. Effect of traffic load on mean cell delays of CBR and bursty stream

0.55

0.6

0.65

0.7 0.75 Traffic intensity ρ

0.8

0.85

0.9

0.95

Figure 3. Effect of traffic load on mean cell and packet delays of CBR stream

0.9

0.6

ρ = 0.5 ρ = 0.7 ρ = 0.9

0.8

ρ = 0.5 ρ = 0.7 ρ = 0.9

0.5

Interdeparture time distribution

Interdeparture time distribution

0.7

0.6

0.5

0.4

0.3

0.4

0.3

0.2

0.2 0.1 0.1

0

2

4

6

8

10 12 Interdeparture time

14

16

18

Figure 4. Interdeparture time distributions of CBR packet

20

0

2

4

6

8

10 12 Interdeparture time

14

16

18

20

Figure 5. Interdeparture time distributions of CBR cell

time S = 3 and the batch size of a CBR packet is 2, the figure 3 shows the difference [3 × 2 − 3 × (1 + 2)/2 = 1.5] between W2P and W2C curves. In Figure 4, we give the interdeparture time distribution of CBR packets. We focus on the probability level, when the interdeparture time is 15. Now we remember that the mean interarrival time of CBR packets is 15. This figure shows that the probabilities decrease at DP = 15, when the traffic intensity ρ increases from 0.5 to 0.9. From this fact, we can conceive that when ρ is lower, the system is more idle, and so the interarrival time holds better at the departure point. In Figure 5, we present the interdeparture time distribution of CBR cells. We can see that the probabilities are high, when the interdeparture times are 3 and 12 in accordance with parameters T = 15, d = 2, and S = 3. We can also see that the probabilities decreases at the interdeparture time 12, when the traffic intensity varies from ρ = 0.5 to ρ = 0.9, and so the proportion of the idle time decreases in the system. Thus we have studied the delay parameters and interdeparture time distributions of CBR traffic.

526

7

C.G. Park and D.H. Han

Conclusion

In this paper, we model and evaluate the AAL MUX to analyze the AAL protocol and CDV of a delay sensitive traffic stream in ATM networks. We concentrate on the performance measures of both packet-level and cell-level. We model the AAL MUX with infinite buffer and two independent input streams as a B X + D/D/1 queue and analyze this queueing system for illustrating the cell depart u re process of AAL MUX in order to analyze the CDV of CBR traffic. This system example is applied to the VoD service using a CBR transport stream with the background traffic stream such as IP and signaling data packets from the other connection. In this paper, we obtain cell delay time and cell interdeparture time distribution of delay sensitive CBR cell stream. Delay parameters consist of mean cell delay of an arbitrary cell and the waiting time of a deterministic CBR cell and the waiting time of a CBR packet in the system. In addition, delay parameters also contain the mean cell delay for a bursty stream. Moreover, the Cell Delay Variation tolerance value by a real time CBR stream can be seriously influenced by the AAL FIFO MUX. To illustrate this CDV of CBR stream, we obtain the cell interdeparture time distribution of a CBR stream.

References 1. R.O. Onvural, Asynchronous Transfer Mode Networks, Artech House (1995) 2. J. Roberts, U. Mocci and J. Virtao, Broadband Network Teletraffic: Final Report of Action COST 242, Springer (1996) 3. J. Roberts and F. Guillemin, Jitter in ATM networks and its impact on the peak rate enforcement, Performance Evaluation 16 (1992)35–48 4. ATM Forum: Video on Demand Specification 1.1, SAA-AMS, March (1997) 5. G.I. Stassinopoulos, I.S. Venieris, K.P. Petropoulis and E.M. Protonotarios, Performance evaluation on adaptation functions in the ATM environment, IEEE Tans. on Comm. 42 (1994) 2335–2344 6. O. Hashida, Y.Takahashi and S. Shimogawa, Switched batch Bernoulli process SBBP. and the discrete-time SBBP/G/1 queue with application to statistical multiplexer performance, IEEE JSAC 9 (1991) 394–401 7. M.F. Neuts, Structured Stochastic Matrices of M/G/1 Type and Their Applications, Marcel Dekker, INC. (1989) 8. P. Yegani, Performance models for ATM switching of mixed continuous bit rate and bursty traffic with threshold based discarding, Proc. ICC’92 (1992) 354.3.1–3.7

Virtual Path Layout in ATM Path with Given Hop Count S´ebastien Choplin Projet MASCOTTE I3S-CNRS/INRIA/Universit´e De Nice-Sophia Antipolis, BP 93, F-06902 Sophia Antipolis Cedex, France. Tel : (+33) (0) 4 92 38 78 80 Fax : (+33) (0) 4 92 38 79 71 [email protected]

Abstract. Motivated by Asynchronous Transfer Mode (ATM) in telecommunication networks, we investigate the problem of designing a virtual topology on a physical topology, which consists of finding a set of virtual paths (VPs) satisfying some constraints in terms of load (the number of VPs sharing a physical link) and hop count (the number of VPs used to establish a connection). For particular network: paths, we give tight bounds on the network capacity (the maximum load of a physical link) as a function of the virtual diameter (the maximum hop count for each connection).

1

Introduction

The advent of fiber optic media has dramatically changed the classical views on the role and structure of digital communication networks. Specifically, the sharp distinction between telephone networks, cable television networks, and computer networks, has been replaced by a unified approach. One of the most prevalent solutions for this new network challenge is called Asynchronous Transfer Mode (ATM for short), and is thoroughly described in the literature [KG98,Pr95]. The transfer of data in ATM is based on packets of fixed length, called cells. Each cell is routed independently, based on two routing fields at the cell header, called virtual channel identifier (VCI) and virtual path identifier (VPI). This method effectively creates two types of predetermined simple routes in the network, namely routes which are based on VPIs (called virtual paths or VPs) and routes based on VCIs and VPIs (called virtual channels or VCs). VCs are used for connecting network users (e.g., a telephone call); VPs are used for simplifying network management - routing of VCs in particular. Thus the route of a VC may be viewed as a concatenation of complete VPs. A major problem in this framework consists in defining the set of VPs in such a way that some good properties are achieved. A capacity (or bandwidth) is assigned to each VP. The sum of the capacities of the VPs that share a physical link constitutes the load of this link. Naturally, this load must not exceed the link capacity, i.e., the amount of data it can carry. P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 527–537, 2001. c Springer-Verlag Berlin Heidelberg 2001 

528

S. Choplin

The maximum load of the links (called the load of the physical network for this set of VPs) is a major component in the cost of the network, and should be kept as low as possible. The maximum number of VPs in a virtual channel, called hop count in the literature, should also be kept as low as possible so as to guarantee low set up times for the virtual channels and high data transfer rates. In its most general formulation, the Virtual Path Layout (VPL) problem is an optimization problem in which, given a certain communication demand between pairs of nodes and constraints on the maximum load and hop count, it is first required to design a system of VPs satisfying the constraints and then minimizing some given function of the load and hop count. We employ a restricted model similar to the one presented in [GZ94]. In particular, we assume that all VPs have equal capacities, normalized to 1. Hence the load of a physical link is simply the number of VPs sharing this link and we don’t focus on the number of VCs contained in a VP. Although links based on optical fibers and cables are directed, traditional research uses an undirected model. Indeed, this model imposes the requirement that if there exists a VP from u to v then there exists also a VP from v to u. In fact, that is the way ATM networks are implemented at the present time. Therefore, we use an undirected model. The directed model has been studied in [BMPP98]. We focus on the all-to-all problem (all pairs of nodes are equally likely to communicate). Thus, the resulting maximum hop count can be viewed as the diameter of the graph induced by the set of VPs. More formally, given a communication network, the VPs form a virtual graph on the top of the physical one, with the same set of vertices but with a different set of edges. Specifically, a VP between u and v is represented by an edge between u and v in the virtual graph. This virtual graph provides a VPL for the physical graph. Each VC can be viewed as a simple path in the virtual graph. Therefore, a central problem is to find a tradeoff between the maximum load and the diameter of the virtual graph. Here we consider the following restricted problem: the physical graph will be a path and given the diameter of the virtual graph we want to minimize the maximum load of a VPL on the path. The figure 1 is an example of VPL on the path with hop count 2 and maximum load 4. For example, the VP between the node 0 and the node 4 uses the physical links 0-1, 1-2, 2-3 and 3-4. The VC used for the request between the nodes 0 and 6 is formed by the VPs 0-4 and 4-6, with an hop count of 2. The maximum load reached on the physical links 3-4 and 4-5 is equal to 4.

2

Related Work

Many articles deal with the VPL problem defined above. Most of them consider the minimization of the diameter of the virtual graph given a load (or capacity) of the physical network, see [SV96,GZ94,GWZ95a,SV96,GCZ96a,KKP97,EFZ97] for the undirected case and [BMPP98] for the directed case. The dual problem

Virtual Path Layout in ATM Path with Given Hop Count

529

VP

0

1

2

3

4

5

6

7

8

physical link

Fig. 1. Example of VPL on the path with hop count 2 and maximum load 4

we consider here has been less studied. Several bounds can be derived from the preceding problems but they are not tight ; a lower bound for planar graphs is given in [BG97]. The particular case of path with the one to many request has been studied in [FZ97,GWZ95a]. In that case, one wants to minimize the eccentricity of the sender in the virtual graph rather than the diameter. This work is sometimes used to give bound on the minimum diameter since it is at most twice the minimum eccentricity. The reader can find an excellent survey of results of the undirected model in [Zak97]. A related problem has been studied in [ABC+ 97].

3

The Model

We use the model described in [BMPP99,Cha98,CGZ96b]. The physical network is represented by an undirected graph G = (V, E) with V the set of nodes of the network and E the set of physical links between them. Usually, we have a family of request R ⊂ V × V . We are interested in a specific one: the all-to-all case (Gossipping). In this case aconnection is required between all pairs of vertices;  namely, R is formed by all n2 couples of distinct elements of V . Therefore the maximal hop count corresponds to the diameter of the virtual graph. A VPL is a collection of simple paths in the network G, called VP. Definition 1. A VPL(H,P) is defined by a virtual graph H = (V, E  ) with the same vertices as G and a routing function P which associates a path P (e ) in G to each edge e in E  . Definition 2. Given a VPL(H,P), the load l(e) of an edge e ∈ E of the physical graph is the number of VP’s that include e; namely, l(e) = |{e ∈ E  |e ∈ P (e )}|. Definition 3. Given a VPL(H,P), the maximal edge load π(G, H, P ) = maxe∈E l(e). Given a graph H, we are looking for a routing function P which minimizes π(G, H, P ). Definition 4. The minimal load of G for H is π(G, H) = minP π(G, H, P ). The problem stated in the introduction can be formulated as follow:

530

S. Choplin

Given a path Pn with n vertices, a hop count h, what is the minimal load π(Pn , h) = minH {π(Pn , H)|DH ≤ h} induced by a virtual graph of diameter DH at most h on the path Pn ?

4

Results

√ h The best bounds known were: π(Pn , h) = Ω( 12 n2 ) from [BG97] and π(Pn , h) = √ h O(h n2 ) from    [BMPP98]. π(Pn , 1) = n2 n2 , in that case the parameter is called the edge-forwarding index studied  in [MHS89], π(Pn , 2) = n2 ,   √ 9 3 3n 2 + O( n4 ). π(Pn , 3) = 12 2 We give here the leading term of π(Pn , h) and the corresponding construction for a fixed hop count h: √ p √ p! √ h h π(Pn , h) = 2 n2 + o( n2 ) for h = 2p √ √ √ h h h 2 n2 + o( n2 ) for h = 2p + 1 π(Pn , h) = √ h 2 2

 p with Mp = sup α j=0 0≤α≤2

Mp

j!(−α2 )j (p−j)!(2j+1)!

. Mp can be easily computed for a given

p, since for a fixed p, it is the maximum value of a bounded degree polynomial function. Proof. All the proofs are in the Appendix.

5

Conclusion and Future Directions

In this paper, we have determined tight bounds of π(Pn , h) for all n (the number of vertices) and fixed hop count h. We can derive from our results an upper bound for the directed model ; perhaps similar methods to those of this paper can provide good lower bounds. Using similar methods, we have also proved that π(Cn , 2) = n3 +O(1) where Cn is the cycle (or ring) with n vertices. It seems more difficult to determine the load π(Cn , h) for h ≥ 3. These results on paths and cycles can be used for designing general networks by partitioning the networks into subnetworks isomorphic to paths and cycles and optimizing the load on each subnetwork. We used a restricted set of requests (all-to-all problem) ; but we believe that it can be used in the case where the requests happen dynamically with fixed uniform probability.

A

Appendix – Proofs

Definition 5. An interval I is a set of connected vertices in the physical graph Pn and we denote its complementary by I = V \I.

Virtual Path Layout in ATM Path with Given Hop Count

531

Definition 6. Let nAA (π,h) be max {n|π(Pn ,h)≤π} that is the maximum number of vertices in the path so that there exists a virtual graph of diameter less than h that loads G less than π. Definition 7. Given an interval I, a vertex x ∈ I is said to be outward if it is adjacent in H to at least one vertex of I. An interval is said to be outward if all its vertices are outward. A.1

Preliminaries: h = 1 and h = 2

In the case h = 1, this is like determining the minimal embedding congestion of the graph of diameter D ≤ h in G. This problem is a classic one in the case of h = 1 because H is isomorph to Kn and π(G, AA, 1) is the edge-forwarding index of G studied in [Gau95,MHS89]. Lemma 8. The minimal load induced by the complete virtual graph on the physical edge (i − 1, i) of the path Pn is i(n − i) for 1 ≤ i ≤ n − 1. Proof. The routing function P is unique (if indeed there is only one path) then as we can see in the figure 2, the number of virtual edges which share the physical edge (i − 1, i) is equal to the number of edges of type (j, i + k) for 0 ≤ j ≤ i − 1 and 0 ≤ k ≤ n − 1 − i that is i(n − i). 0

n-1

j i-1

i

i+k

Fig. 2. The load of the edge (i − 1, i) is i(n − i).

Corollary 9 (The edge-forwarding index [MHS89). ] π(Pn , 1) =    Proof. From the Lemma 8, π(Pn , 1) = max i(n − i) = n2 n2 .

n n 2

2

.

1≤i≤n−1

Lemma 10. The minimal load induced by a virtual graph of diameter 2 on the physical edge (i − 1, i) of Pn is at least min {i, n − i}. Proof. Let Ii = {0, 1, . . . , i − 1} and Ii = {i, . . . , n − 1}. If there exists a nonoutward vertex of Ii , because the diameter is 2, each vertex of Ii has a neighbour in Ii , so the load of the edge (i − 1, i) is at least n − i. Otherwise , each vertex of Ii is an outward vertex and so the load  (i − 1, i) is at least i. Then the load  of is greater than max (min {i, n − i}) = n2 . 0≤i≤n

Corollary 11. π(Pn , 2) =

n 2

.

Proof. The bound is reached by connecting the vertex vertices.

n 2

with all the other

In order to compute π(Pn , h), we will determine nAA (π, h). Therefore we can reverse the result to get π(Pn , h).

532

A.2

S. Choplin

Upper Bound for nAA (π, h)

Remark 12 (interval). Given a virtual graph H of diameter h on Pn , there exists an integer k and k vertices a1 < a2 < . . . < ak such that – ∀0 ≤ i ≤ k: all the vertices in [ai + 1, ai+1 − 1] are outward vertices. – ∀0 ≤ i ≤ k − 1 a vertex in [ai + 1, ai+1 ] is not an outward vertex. (with a0 = −1 and ak+1 = n). We will denote by Ji the interval [ai + 1, ai+1 ] and Ii the outward interval [ai + 1, ai+1 − 1]. Now we call the intervals Ji blocks of level 1 of the topology H. We note that the graph of the interval {Ji }1≤i≤k−1 (or blocks) of level 1 of H is also a virtual topology on the path but with k vertices; we note it H1 . The diameter of this topology is at most h − 2 because each of the interval has at least one nonoutward vertex. In an iterative way, we define some blocks of blocks. The blocks from H1 are called blocks of level 2. Formally: – The blocks of level l from a virtual graph H of diameter h are the blocks of level 1 from the topology Hl−1 . – The topology Hl is the graph formed by the blocks from Hl−1 . – The vertices from Pn are the blocks of level 0. – H0 = H. Proposition 13. For i ≤

h 2 −1

the diameter of the topology Hi is at most h−2i.

Proof. Directly by induction. Definition 14. The available load of an interval I ∈ {Ii }i (∀i, Ii is an interval and ∪i Ii = V ) is π − πI where πI is the load induced by the edges between I and all the other intervals. Proposition 15. The cardinal of an outward interval with an available load l is at most 2l. Proof. If the interval has k vertices, k edges load the 2 extreme edges of the interval. Then k ≤ 2l.

Definition 16. Let denote by B(l, c) the maximum number of vertices in a block of level l with an available load c. Proposition 17. for  h = 2p + 1 odd, nAA (π, h) ≤ nAA (π, h) with k−1 nAA (π, h) = max √ i=0 B(p, π − i(k − i − 1)) + B(p, π) k≤2 π+1

Virtual Path Layout in ATM Path with Given Hop Count

533

Proof. Let H be a virtual graph of diameter h = 2p + 1 and load π on the path Pn . The graph Hp of the blocks of level p is the complete graph according to the Proposition 13. Let us fix k = |V (Hp )|. Now we consider the blocks of level p {Ji }0≤i≤k−1 ; they induce a complete graph with a load i(k − i − 1)1 on all the physical edges of the block Ji because of the lemma 8. Then the available load of the block Ji is at most π − i(k − i − 1). So for 0 ≤ i ≤ k − 1, |Ji | ≤ B(p, π − i(k − i − 1)). To finish we have to consider the interval Jk ; this interval is an outward one and so its cardinal is lower than the one of the block of level p k−1 then |Jk | ≤ B(p, π).Then, nAA (π, 2) ≤ i=0 B(p, π − i(k − i − 1)) + B(p, π). √ √ Remark 18. We can consider that k ≤ 2 π + 1, because if k > 2 π + 1 then it exists i so that π − i(k − i − 1) < 0, that’s a nonsense. ≤ nAA (π, h) with Proposition 19.  for h = 2p even, nAA (π, h)    k−1  2 2 i=0 B(p − 1, π − i) + B(p − 1, π) nAA (π, h) = max k≤2π

Proof. Let H be a virtual graph of diameter h = 2p and load π on the path Pn . The graph Hp of the blocks of level p is a graph of diameter 2 according to the Proposition 13. We fix k = |V (Hp−1 )| and now we consider the blocks of level p− 1 {Ji }0≤i≤k−1 ; they induce a graph of diameter 2 with a load min {i, n − i − 1}2 on all the physical edges of the block Ji because of the lemma 10. Then the available load of the block Ji is at most π−min {i, k − i − 1}. So for 0 ≤ i ≤ k−1, |Ji | ≤ B(p, π − min {i, k − i − 1}). To finish we have to consider the interval Jk ; this interval is an outward one and so its cardinal is lower than the one of the block of level p ; therefore |Jk | ≤ B(p, π). Then, we obtain the result because: min {i, k − i − 1} = i if i ≤ k−1 2 and min {i, k − i − 1} = k − i − 1 otherwise. A.3

Lower Bound for nAA (π, h)

The techniques employed in the proof of the lower bound tell us that the good virtual topologies with diameter 2p + 1 may be constructed with blocks of level p linked together in a complete graph. We can note that the blocks of level p are sets of vertices which we can get out of in p jumps exactly. Then we can choose as blocks of level p some maximal trees with eccentricity p, the same as the one described by Gerstel, Wool and Zaks in [GWZ95b]. An equivalent proof can be given for the case h is even.  2 Proposition 20. for all h = 2p+1odd, for all k, k2 ≤ π we have: nAA (h, π) ≥

k−1 nAA (π, h) with nAA (π, h) = max √ i=0 ball(p, π − i(k − i)) with ball(p, c) = k≤2 π min{p,c} i lr 2 i i the number of internal points in the p-dimensional Sphere of i=0 radius c. 1 2

k − i − 1 because we don’t count the load induced by Ji into the complete graph. as in the Proposition 17 we don’t count the load induced by Ji .

534

S. Choplin

Proof. We obtain the construction as follows: we choose k vertices a0 , a1 , . . . , ak−1 on the path and we link them with a complete graph, then we root 2 trees in each vertex (one on the right and one on the left) which use all of the available load and with eccentricity p as shown by the figure 3. We note n(p, c) the maximal number of vertices that a tree of available load c and eccentricity p can contain. Then we have the following recurrence relation: n(p, c) = n(p, c − 1) + n(p − 1, c − 1) + n(p − 1, c) = 12 ball(p, c) + 12 , with n(1, c) = c and n(p, 0) = 1 (There are the trees used in [GWZ95b] for the One-To-All-case).

Fig. 3. Optimal construction on the path for h odd.

The available load: on the left of a0 is π, between ai−1 and ai is π − i(k − i) for 0 ≤ i ≤ k, on the right of ak is π. Then we can root: on the left of a0 a tree of eccentricity p with a load π which contains n(p, π) vertices, for 0 ≤ i ≤ k, between ai and ai+1 2 trees of eccentricity p with a load π − i(k − i) which contain 2n(p, π − i(k − i)) on the right of ak : a tree of eccentricity p with a load π which contains n(p, π) vertices. So the total number of vertices is k−1 2 i=0 n(p, π − i(k − i)) − k. Remark 21. A similar construction can be realized in the case h is even (h = 2p), then the graph of blocks of level p − 1 is isomorph to the graph of diameter 2 used in the case h = 2. Each vertex of this graph is taken over from an optimal tree of eccentricity p − 1 and a maximal available load. A.4

Determination of nAA (π, h)

nAA (π, h): Calculation of the Upper Bound of nAA (π, h). We proceed as follows: the available load of a block of level l is c, then we determine the maximal number of vertices B(l, c) that it can contain according to B(l − 1, i). This relation is given by the following recursion equation: Lemma 22. B(l, c) = 2(B(l − 1, 1) + B(l − 1, 2) + · · · + B(l − 1, c)) + B(l − 1, c) Proof. A block of level l with an available c is formed with some blocks of level l − 1 and all (except one) have an outward vertex. We can suppose without lost of generality that all the edges don’t cross each other (Gerstel, Wool and Zaks [GWZ95b]). Then, a block of level l with an available load c is formed with at most: 2 blocks of level l − 1 with an available load equal to 1, 2 blocks of level l −1 with an available load equal to 2, . . . , 2 blocks of level l −1 with an available load equal to c. Now we have to add a block of level l − 1 with an available load

Virtual Path Layout in ATM Path with Given Hop Count

535

equal to at most c (this is the block which is not outward), as we can see in the figure 4.

B(l-1,1)

B(l-1,c-1)

B(l-1,c)

B(l-1,c-1)

B(l-1,1)

B(l-1,c)

Fig. 4. Composition of a block of level l with an available load c.

In order to determine B(l, c), we introduce the generating function: B(l, z) = ∞ i i=0 B(l, i)z . The blocks of level 0 are reduced to vertices, B(0, c) = 1 and l l 1 then B(0, z) = 1−z . Then we have, B(l, c) = 2l!c + o(cl ). Proposition 23. for all h= 2p + 1 odd,

p αj!(−α2 )j h/2 nAA (π, h) = 2p π h/2 sup ) j=0 (p−j)!(2j+1)! + o(π 0≤α≤2



p k p Proof. according to Lemma 22: nAA (π, h) = 2p! max (π − i(k − i)) √ i=0 k≤2 π+1 k k p p p−j p h/2 + o(π ) because of i=0 (π − i(k − i)) = j=0 j π (−1)j i=0 ij (k − i)j k and we can approach i=0 ij (k − i)j using the Euler-Mac Laurin’s summation formula, in

(j!)2 2j+1 (2j+1)! k p p+1/2

nAA (π, h) = 2 π

+ o(k 2j+1 ). So we have: p j! (−α2 )j + o(π h/2 ) max α j=0 (p−j)!(2j+1)!

0≤α≤2+O(n1/h )

Proposition 24. for all h = 2p even, nAA (π, h) =



2p π p p!

+ o(π h/2 )

  2 i=0 B(p − 1, π − i) + B(p − 1, π) Proof. nAA (π, h) = max k≤2π 

k−1  2 −1 2p p−1 + o(π p ) (π − i) nAA (π, h) = (p−1)! max i=0  k−1 2 −1

k≤2π

Clearly, this function of k reaches its maximum when k is maximum, i.e. p p k = 2π. Using the integral calculation, we obtain: nAA (π, h) = 2 p!π + o(π p ). nAA (π, h): Calculation of the Lower Bound of nAA (π, h). Proposition 25. for all h, nAA (π, h) = nAA (π, h) + o(π h/2 ). min(p,c) i lc 2p cp 2 i i = p! + o(cp ) if p  c. Proof. Note that ball(p, c) = i=0 In the odd case: h = 2p + 1, with the Proposition 

20, we can say that: k p 2p + o(π h/2 ). Then nAA (π, h) = nAA (π, h) = p! max √ i=0 (π − i(k − i)) nAA (π, h) + o(π

k≤2 π h/2

). The same is true in the even case.

536

S. Choplin

Corollary 26. nAA (π, h) = nAA (π, h) = 2p π (2p+1)/2 sup

2p π p p! 

0≤α≤2

+ o(π h/2 ) for h = 2p 2 j p α j=0 j!(−α )

(p−j)!(2j+1)!

+ o(π h/2 ) for h = 2p + 1 (π, h) = nAA (π, h) +

(π, h) ≤ nAA (π, h) ≤ nAA (π, h) and nAA h/2 ) then nAA (π, h) = nAA (π, h) + o(π h/2 ) = n (π, h) + o(π h/2 ). o(πProof. nAA AA

Theorem 27. π(Pn , h) =

2 2/h + o(n ) for 2/h n 2(M  p )

p j!(−α2 )j α j=0 (p−j)!(2j+1)! sup 0≤α≤2

π(Pn , h) = Mp =

1/h

(p!)1/p 2/h n 2 2/h

+ o(n2/h ) for h = 2p h = 2p + 1 with

References [ABC+971 W. Aiello, S. N. Bhatt, F. R. K. Chung, A. L. Rosenber, and R. K. Sitaraman. Augmented ring networks. Technical Report UM-CS-1997-036, University of Massachusetts, Amherst, Computer Science, June, 1997. [BG97] Becchetti and Gaibisso. Lower bounds for the virtual path layout problem in ATM networks. In Theory and Practice of Informatics, Seminar on Current Trends in Theory and Practice of Informatics, LNCS, volume 24. 1997. [BMPP98] J-C. Bermond, N. Marlin, D. Peleg, and S. Perennes. Directed Virtual Path layout in ATM networks. In Proc. of the 12th International Conference on Distributed Computing, Andros Greece, 1998. LNCS 1499, pages 75-88. [BMPP99] J-C. Bermond, N. Marlin, D. Peleg, and S. Perennes. Virtual Paths Layout with Low Congestion or Low Diameter in ATM Networks. In lgre rencontre francophone... ALGOTEL ‘99, Mai 1999. [Cha98] Pascal Chanas. Dimensionnement de re seaux ATM. PhD thesis, CNET Sophia, Sept. 1998. [EFZ97] T. Eilam, M. Flammini, and S. Zaks. A complete characterization of the path layout construction problem for ATM networks with given hop count and load. In 24th International Colloquium on Automata, Languages and Programming (ICALP), volume 1256 of Lecture Notes in Computer Science, pages 527-537. Springer-Verlag, 1997. M. Feighlstein and S. Zaks. Duality in chain ATM virtual path layouts. [FZ97] In 4th International Colloquium on Structural Information and Communication Complexity (SIROCCO), Monte Verita, Ascona, Switzerland, July 1997. [Gau95] G. Gauyacq. Routages uniformes duns les graphes sommet-transitifs. PhD thesis, Universiti! Bordeaux I, 1995. [GCZ96a] 0. Gerstel, I. Cidon, and S. Zaks. The layout of virtual paths in ATM networks. IEEE/ACM Transactions on Networking, 4(6):873-884, 1996. [GCZ96b] 0 rnan Gerstel, Israel Cidon, and Shmuel Zaks. Optimal Virtual Path Layout in ATM Networks with Shared Routing Table Switches. Chicago Journal of Theoretical Computer Science, 1996(3), October 1996.

Virtual Path Layout in ATM Path with Given Hop Count

[GWZ95a]

537

0. Gerstel, A. Wool, and S. Zaks. Optimal Layouts on a Chain ATM Network. In 3rd Annual European Symposium on Algorithms, volume LNCS 979, pages 508-522. Springer Verlag, 1995. [GWZ95b] 0. Gerstel, A. Wool, and S. Zaks. Optimal layouts on a chain ATM network. In 3rd Annual European Symposium on Algorithms (ESA), (LNCS 979), Corfu, Greece, pages 508-522, 1995. To appear in Discrete Applied Mathematics. [GZ94] Ornan Gerstel and Shmuel Zaks. The virtual path layout problem in fast networks. In Symposium on Principles of Distributed Computing (PODC ‘94), pages 235-243, New York, USA, August 1994. ACM Press. D. Kofman and M. Gagnaire. Ritseaux haut debit, reseaux ATM, reseaux [KG981 locaux et reseaux tout-optiques. InterEditions-Masson, 1998. E. Kranakis, D. Krizanc, and A. Pelt. Hop-congestion trade-offs for high[KKP97] speed networks. International Journal of Foundations of Computer Science, 8:117-126, 1997. J-C. Meyer, M-C. Heydemann, and D. Sotteau. On Forwarding indices of [MHS89] networks. Discrete Applied Mathematics 23:103-123, 1989. M. De Pricker. Asynchronous Transfer Mode, Solution for Broadband ISDN. [Pri95] Prentice Hall, August 1995. L. Stacho and I. Vrt’o. Virtual path layouts in atm networks. In Structure, [SV96] Information and Communication Complexity, 3rd Colloquium, SIROCCO, pages 2699278. Carleton University Press, 1996. S. Zaks. Path Layout in ATM Networks - A Survey. In The DIMACS [Zak97] Workshop on Networks in Distributed Computing, DIMACS Center, Rutgers University, Oct. 1997. manuscript.

Simulation-Based Stability of a Representative, Large-Scale ATM Network for a Distributed Call Processing Architecture Ricardo Citro1 and Sumit Ghosh2 1

Intel Corporation, Chandler, Arizona [email protected] 2 Secure Network Design Laboratory, Department of Electrical & Computer Engineering Stevens Institute of Technology, Hoboken, NJ 07030 [email protected]

Abstract. In response to the lack of realistic performance guarantees in “store and forward” networks, the asynchronous transfer mode (ATM) network has resurrected the idea of connection oriented calls. Thus, for every user call, the ATM network first determines and verifies a route, where possible, that meets the user’s quality of service (QoS) requirements, and then transports the traffic along the route. In classic telephony, a typical call processing event Pe requires 200 ms while an average call duration Cd lasts 90 s. The ratio Pe /Cd = 450, is large enough to render the call processing effort meaningful. While the link bandwidth in classic telephony is 64 Kb/s and each user call is allocated an identical 8 Kb/s bandwidth, links bandwidths in ATM equal or exceed 155 Mb/s and users may be allocated, in general, much higher, variable bandwidths depending on need and availability. This paper projects that the trend of short call durations, of ftp, http, image retrieval, and email messages type, will gain increasing processing prominence in the future, fueled by our impatience and the rapid growth in the backbone link bandwidths that is already outpacing the expected increase in the average message size transported across the networks. As backbone speeds increase and call durations decrease, networks will be perceived as more responsive and potentially attract a very high rate of users interacting with the networks. Under these circumstances, it is unlikely for the traditional uniprocessor based ATM node architecture to successfully address the increased call processing demand, resulting in overall performance degradation. Therefore, new call processing architectures for ATM node are necessary. An efficient distributed call processor architecture has been presented in [1] to accelerate the call setup process. Since the architecture is designed to address a highly stressed network, just short of driving it into “instability,” it is imperative that while preserving the quality of service (QoS) guarantees, the distributed call processing architecture prevent perturbations on the network during peek traffic hours. This need translates into the stability of the network in the presence of user call requests and QoS metrics. Network stability is viewed as a condition that must be satisfied so that a large scale decentralized representative P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 538–548, 2001. c Springer-Verlag Berlin Heidelberg 2001 

Simulation-Based Stability of a Representative, Large-Scale ATM Network

539

high speed network will consistently perform without degradation in the presence of unexpected perturbation. This paper presents the stability study for a representative, large-scale, Private Network Network Interface (PNNI) ATM network under the distributed call processing introduced in [1].

1

Introduction

The issue of stability in large-scale distributed systems was first introduced in [2] and subsequently detailed in [3] [4]. This paper is the first to report on the stability analysis of a large-scale PNNI network under distributed call processing architecture. Most previous published studies have relied on mathematical queueing theory to model a single processor node network [5], or a source-destination paradigm neglecting important information that may be inhibited on intermediate hops for a large real scale network. In this study, network stability is a condition that must be satisfied so that a large scale decentralized representative high speed network will consistently perform without degradation in the presence of unexpected perturbation. This perturbation may be characterized by a sudden or an abrupt increase in traffic intensity at any time. This intensity may be conditioned to burstiness caused by peak hours of network utilization or by increased congestion experienced in the intermediate paths of the network. Here, congestion is directly related to resource utilization which translates to long call setup times.

2

Modeling the Distributed Call Processing

The call processing architecture is modeled for a 15-node and 50-node network derived from the very high performance Backbone Network Service (vBNS) topology, which is the representative high performance network service implemented by MCI [6] and sponsored by the National Science Foundation (NSF). By using the vBNS high-level topology, a 15-node and a 50-node representative PNNI networks are constructed of which the 15-node network is shown in Figure 1. On the top of Figure 1, a high level hierarchy is constructed with higher-level nodes corresponding to major US cities, forming intergroups. In the middle of Figure 1, lower-level nodes are constructed and organized into peer groups. Each peer group constitutes a higher-level node and can consist of N nodes having one or more incoming and outgoing links. When looking at the 15-node network in Figure 1, it is clearly noticeable that each peer group has three nodes forming intragroups with the shaded node assigned as a peer group leader. In an intragroup, each node corresponds to a city district surrounding the major city with neighboring cities not distant more than 40 miles from each other. The 50-node low level hierarchy, not presented here, is formed by 9 peer groups with most of the peer groups containing 6 nodes, except for the two left edges that contain 4 nodes each. Here, intragroup nodes are also labeled to a city in the vicinity region with district cities apart from each other no more than 40 miles. Associated

540

R. Citro and S. Ghosh

with every link is the value of the propagation delay and distance in miles. The propagation delay is computed from dividing the actual distance between the corresponding cities by the speed of the electromagnetic transmission in optical fibers. Also, associated with every link is its maximum capacity which is the basic 155.52 Mbits/sec. Hence, a node consists of two components: the processing system or call processor and the switching fabric. The call processor is slower but contains all the higher level information which in turn is more powerful and sophisticated. The switch fabric is a fast hardware but with a more limited functionality. Traffic cells which need to be multiplexed through the node are handled by the switch fabric without any involvement of the processing system. On the other hand, all signaling control packets associated with call setup are processed by the call processor. The signaling control involves call admission control, routing, QoS management, virtual path/virtual channel connection and permanent virtual path/virtual channel connection. PEER GROUP CHICAGO

PEER GROUP DENVER

PEER GROUP SAN FRANCISCO

1011 mi

1257 mi 1085 mi

380 mi

PEER GROUP LOS ANGELES

PEER GROUP HOUSTON

1566 mi

PEER GROUP

CHICAGO PEER GROUP

2000 : (1011 mi)

DENVER

AURORA

80 : (40 mi)

7

PEER GROUP

SAN FRANCISCO

80 : (40 mi)

5

80 : (40 mi)

8 EVANSTON

RIDGE LAKEWOOD

80 : (40 mi)

4 SAN JOSE

BERKELEY

1

80 : (40 mi)

80 : (40 mi)

SANTA CRUZ

9

80 : (40 mi)

2

6

80 : (40 mi)

JOLIET

80 : (40 mi)

2500 : (1257 mi)

ENGLEWOOD

3 2143 : (1085 mi) 750 : (380 mi) PEER GROUP

HOUSTON

PEER GROUP

LOS ANGELES

IRVINE

80 : (40 mi)

14

PASADENA

SANTA MONICA

80 : (40 mi)

BAYTOWN

80 : (40 mi)

80 : (40 mi) 80 : (40 mi)

80 : (40 mi)

PASADENA

11

10

13

15

3093 : (1566 mi)

12

RICHMOND

Fig. 1. 15-node PNNI Network Topology

Simulation-Based Stability of a Representative, Large-Scale ATM Network

2.1

541

Modeling Memory Contention and Processor Service Time

In the shared memory multiprocessor model, memory contention may occur when more than one processor has to wait in order to reference data in memory. In this model, memory contention is a function of three parameters: namely, (1) the lock operation (accessing the critical section), (2) the spin-lock time and (3) the memory access time. Hence, the model for memory contention can be expressed as CT (N ) =



(MAi + LiA ) +

N



PLi

(1)

N

where CT is the contention time for N number of processors; MA is the memory access time for processor N; LA is the memory access time to lock structure, and PL is the processor spin-lock time. The memory access time is calculated as follows. It is well known the difficulty in estimating the memory access time if no representative real software is available in source code in order to count the number of read/write accesses. For this reason, an accurate software PNNI-ATM network simulator is implemented which is closely consistent with the PNNI signaling protocol. Therefore, a more precise estimation on the number of memory accesses is quantified when building the network topology state information. This value is obtained by counting the number of accesses during an initiate call setup. Since the simulator executes on a Pentium 90 Mhz, the processor clock cycle time is 11 ns. The memory speed used in the Pentium workstation is 60 ns. The topology database for each call is built dynamically, creating routing map for intragroup and for intergroup. Intragroup is a collection of nodes within a peer group, and intergroup is a collection of border nodes connecting peer groups. The number of memory accesses for an intragroup topology is counted to be approximately equal to 280,000 and for intergroup to be approximately equal to 600,000. The number of memory access obtained for intragroup and intergroup are an overestimate. The actual number is probably much lower. Therefore, the actual results are likely to be much better than the data reported here. Now, it is possible to find the memory access time for one processor, which is given by MA = ηa ∗ 

(2)

where ηa is the number of memory access and  is the memory speed that here is a constant value. Therefore, for intragroup and intergroup the time a processor takes to access the shared memory when creating the routing path is 16.8 ms and 36 ms respectively. Here, the time to access the memory is modeled by a uniform distribution between 16 ms - 36 ms. In this research, the processor service time is derived from actual measurement obtained from simulation. Here, the processor service time is represented by an exponential distribution with mean λ = 43 ms. This value is found as follows.

542

R. Citro and S. Ghosh

It is a matter of great interest to use realistic data that represent distributions related to call processing time when executing PNNI signaling protocols. With no published available information regarding the call setup time distribution on a PNNI ATM network, simulation is performed and the service time is measured from a 50-node network across all intragroup and intergroup calls. In the simulation, all nodes are source and destination simultaneously. The simulation is run on 7 Pentium 90 Mhz workstations. The system’s run time library is then used in order to provide access to the underlying machine’s internal clock. When an “initiate call setup” is executed, the environment operating system keeps track of the processor time that is being used. When the library function call is invoked, the value returned is the system’s best approximation to the time used by the program up to that point. The simulation runs for 1,000,000 timesteps (2.7 sec) where one timestep is equal to 2.7 µs. With an average of 200 calls asserted per node, the average processing time obtained is 21 ms for intragroup and 43 ms for intergroup. These results reflect the run time environment, and they do not constitute a generalization. Thus, the processing service time is modeled by an exponential distribution with mean λ = 43ms and using f (x) = λe−λx

(3)

It is also important to observe that the database access time of 16 ms to 36 ms is within processor service time region, meaning that the processor spends around 7 ms for CPU intensive bound tasks. The remaining time is exclusively used for accessing the topology database that characterizes the memory bound nature of the call processor. 2.2

Implementation of the Distributed Call Processor

The design of a distributed call processing model is implemented on a PNNIATM simulator. The reference model is presented by way of three distinct levels: the routing-topology database, the distributed processing system and the switching fabric. The PNNI simulator developed and implemented adheres to the PNNI 1.0 specification [7], following the reference architecture model. This simulator is implemented in C++ with more than 20,000 lines of code. The model is able to support efficient simulations of 1 to N processors which can handle all the signaling and other associated protocols. The distributed call processing model is implemented in C++. The model is simulated on a network of 40+ Pentium workstations for a 15-node topology and for a 50-node topology under linux and configured as a loosely-coupled parallel processor. The implementation constitutes a large-scale distributed simulation that is accurate, asynchronous, and that executes for 36 hours of wall clock time on a 15-node network, and for 60 hours of wall clock time on a 50-node network. Hundreds of simulation runs are executed for different input call traffic distributions. Simulations using 1, 4, 10, 15, and 20 processors are performed, totaling hundreds of simulations for a 15switch network and for a representative 50-switch network that covers different

Simulation-Based Stability of a Representative, Large-Scale ATM Network

543

case scenarios. The cumulative size of the output data generated for each case studied and implemented, following a simulation run, exceeds 7Mbytes. The value of the timestep, 2.73 µs, which reflects the accuracy of the simulation, is determined by the fraction of an individual ATM cell (53 bytes) with the fastest link in the network, namely, 155.5 Mb/s. In addition, the accuracy is reflected by the individual cell processed in each node, and by the fact that the underlying discrete event simulation algorithm ensures the correct order of execution of the events. The input traffic distributions utilized here correspond to the current traffic models in the literature, underscoring the significance of the results. In theory, users may assert traffic into the network at every node. In this study, traffic is asserted into the network at random selected nodes. However, all the nodes in the network are source and destinations, participating in the routing of the traffic calls.

3 3.1

Network Stability Analysis under Distributed Call Processing The Traffic Models and Input Traffic Distributions

The choice of the input traffic and other network input parameters in network simulation is crucial towards obtaining realistic performance data and useful insights into the network behavior. Traffic generation represents a careful tradeoff between the goal of exposing the network to worst case stress and examining its behavior and the need to ensure a stable operational network, one that executes continuously, 24 hours a day, 365 days a year, without failing. In this research, while the synthetic traffic is stochastic, it is designed to resemble an operational system. The key input traffic parameters include, (1) call arrival distribution, (2) bandwidth distribution in the calls, (3) call duration distributions in the calls, (4) traffic mix, i.e. the relative percentage of inter- and intra-group calls in the entire network, and (5) the low level traffic models. With the exception of item 4, the distributions in items 1 through 5 are generated stochastically and the choice of the key parameters are explained subsequently. Following their generation, traffic stimuli are saved in files for use during simulation. 3.2

Simulation Experiments, Results, and Analysis

The condition for network stability must be satisfied; i.e, the rate of assertion of user call setup requests must be such that the call setup times with respect to the progress of the network operation must be uniform during simulation time. The result for the stability study must be satisfied for a 15-node and for a 50node network by using the parameters in Table 1 and Table 2. Also, the stability study for a 1-processor scenario cannot be easily extrapolated to that for 4-, 10-, 15-, and 20-processors scenario. There are two opposing forces at play. Firstly, with more processors involved, the queue length of the outstanding calls will be lessened, which will tend to improve the call setup situation. Secondly, because

544

R. Citro and S. Ghosh

more calls are now processed by a higher number of processors, the call setup will tend to worsen. That’s why it is done all the stability study for 1-processor, 4-, 10-, 15-, and 20-processors. The behavior of the call setup time is not one of continual increase. Table 1. Call Traffic Parameters - Scenario 1 Service Transmission Rate (bps) Session Duration (sec) Voice and Audio 64K 90 1M-6M 1 File Transfer

Table 2. Call Traffic Parameters - Scenario 2 Service Transmission Rate (bps) Session Duration (sec) Voice and Audio 64K 90 File Transfer 1M-6M 0.054

The distribution generated using the traffic parameters for a 15-node network indeed produces a stable network. Figures 2 (a), (b), and (c) show the call setup time as a function of simulation time for the peer group leader node 1, for the border node 8 and for the peer group leader node 10 with all the nodes utilizing 1 call processor model. These are representative nodes since they are involved in processing signaling cells at different points in the network and, therefore, offering insights on the nature of the traffic of calls that are propagated from nodes 1, 8, and 10 to nodes 2, 9, and 11 during simulation time. By analyzing Figure 2, it can be inferred that the network shows a stable rate of assertion of user call setup requests characterized by the uniform fluctuation of the points in the graph. Figure 3 (a)-(c), and Figure 4 (a)-(c) all show the call setup time as a function of simulation time relative to the same nodes but for a different number of call processors. The sharp peaks presented in the Figure are related to calls that are addressed to nodes that belong to other peer group boundaries, which then present a higher call setup time. The gaps between consecutive calls are due to the high percentage of calls asserted that are rejected. Therefore, not only all the plots show a uniform behavior that evidence the network stability, but also they show that the network stability improves with the increase in the number of processors for this particular traffic. For a 50-node network, the traffic parameters are utilized and the distribution generated satisfies the criteria for network stability. The distribution generated produces a stable network as shown in Figure 5 (a)-(c). The Figure shows the call setup time, in timesteps, as a function of simulation time for nodes 5, 20, and 45, each utilizing 1 processor. The plots show all the calls that are originated from nodes 5, 20, and 45, which then are propagated to the adjacent nodes 4, 15, and 47. The plots also capture the stable rate of assertion of user call setup

Simulation-Based Stability of a Representative, Large-Scale ATM Network 50.00

180.00

Node 1 (1 Processor)

Node 10 (1 Processor)

Node 8 (1 Processor) 140.00

45.00

160.00

40.00

120.00

35.00 30.00 25.00 20.00

Call Setup Time x 10 3 (timesteps)

140.00 Call Setup Time x 10 3 (timesteps)

Call Setup Time x 10 3 (timesteps)

545

120.00

100.00

80.00

60.00

15.00

0.00

0.00 0.00

200.00

400.00

600.00

Simulation Time x 10

60.00

20.00

20.00

5.00

80.00

40.00

40.00

10.00

100.00

0.00 0.20

800.00

3

0.40

0.60

Simulation Time x 10

0.80

1.00

0.00

6

200.00

400.00

800.00

(c)

(b)

(a)

600.00 3

Simulation Time x 10

Fig. 2. Call Setup Time as a Function of Simulation Time (timesteps) for (a) source node 1 to destination node 2 (1 processor), (b) source node 8 to destination node 9 (1 processor) and (c) source node 10 to destination node 12 (1 processor) (relative to a 15-node network)

70.00

250.00

Node 1 (4 Processors)

300.00

Node 8 (4 Processor)

60.00

Node 10 (4 Processor)

250.00

50.00

40.00

30.00

Call Setup Time x 10 3 (timesteps)

Call Setup Time x 10 3 (timesteps)

Call Setup Time x 10 3 (timesteps)

200.00

150.00

100.00

200.00

150.00

100.00

20.00

50.00 50.00

10.00

0.00

0.00

0.00 0.00

0.20

0.40

0.60

Simulation Time x 10

(a)

0.80

6

1.00

0.00

0.20

0.40

0.60

Simulation Time x 106

(b)

0.80

1.00

0.00

0.20

0.40

0.60

Simulation Time x 10

0.80

1.00

6

(c)

Fig. 3. Call Setup Time as a Function of Simulation Time (timesteps) for (a) source node 1 to destination node 2 (4 processor), (b) source node 8 to destination node 9 (4 processor) and (c) source node 10 to destination node 12 (4 processor) (relative to a 15-node network)

R. Citro and S. Ghosh

400.00

200.00

Node 1 (20 Processors)

300.00

Call Setup Time x 10 3 (timesteps)

Call Setup Time x 10 3 (timesteps)

350.00

250.00

200.00

150.00

200.00

Node 8 (20 Processor)

180.00

180.00

160.00

160.00 Call Setup Time x 10 3 (timesteps)

546

140.00 120.00 100.00 80.00 60.00

Node 10 (20 Processor)

140.00 120.00 100.00 80.00 60.00

100.00

40.00

40.00

20.00

20.00

50.00

0.00

0.00 0.00

0.20

0.40

0.60

Simulation Time x 10

6

0.80

1.00

0.00

0.00

0.20

0.40

0.60

0.80

Simulation Time x 10

(a)

1.00

0.00

6

200.00

400.00

600.00

Simulation Time x 10

(b)

3

800.00

(c)

Fig. 4. Call Setup Time as a Function of Simulation Time (timesteps) for (a) source node 1 to destination node 2 (20 processor), (b) source node 8 to destination node 9 (20 processor) and (c) source node 10 to destination node 12 (20 processor) (relative to a 15-node network)

50.00

80.00

Node 5 (1 Processor) Node 5

45.00

50.00

Node 20 (1 Processor) Node 20

Node 4

45.00

70.00

40.00

25.00 20.00 15.00

50.00

40.00

30.00

20.00

10.00

(timesteps)

30.00

60.00

35.00

3 Call Setup Time x 10

(timesteps)

35.00

3 Call Setup Time x 10

(timesteps)

40.00

3 Call Setup Time x 10

Node 45 (1 Processor) Node 47 Node 45

Node 15

25.00

30.00

20.00 15.00 10.00

10.00

5.00

5.00 0.00

0.00 0.40

0.50

0.60

0.70

Simulation Time x 10 6

(a)

0.80

0.90

1.00

0.00 400.00

500.00

600.00

700.00

Simulation Time x 10 3

(b)

800.00

0.40

0.50

0.60

0.70

0.80

0.90

1.00

Simulation Time x 10 6 (c)

Fig. 5. Call Setup Time as a Function of Simulation Time for (a) source node 5 to destination node 4 (1 processor), (b) source node 20 to destination node 15 (1 processor) and (c) source node 45 to destination node 47 (1 processor) (relative to a 50-node network)

Simulation-Based Stability of a Representative, Large-Scale ATM Network 300.00

80.00

Node 45 (20 Processors) Node 47 Node 45

Node 20 (20 Processors)

Node 5 (20 Processors) Node 5 Node 4

Node 20

Node 15

547

140.00

70.00

250.00

150.00

100.00

(timesteps)

50.00

3 Call Setup Time x 10

(timesteps)

200.00

3 Call Setup Time x 10

3 Call Setup Time x 10

(timesteps)

120.00 60.00

40.00

30.00

20.00

100.00

80.00

60.00

40.00

50.00

20.00

10.00

0.00

0.00 0.40

0.50

0.60

0.70

0.80

Simulation Time x 10 6

(a)

0.90

1.00

0.00 400.00

500.00

600.00

700.00

Simulation Time x 10 3

(b)

800.00

0.40

0.50

0.60

0.70

0.80

0.90

1.00

Simulation Time x 10 6

(c)

Fig. 6. Call Setup Time as a Function of Simulation Time for (a) source node 5 to a destination node 4 (20 processor), (b) source node 20 to a destination node 15 (20 processor) and (c) source node 45 to a destination node 47 (20 processor) (relative to 50-node network)

requests. It may be noticed that call setup time stays mostly uniform during simulation time which characterizes a stable network. The network stability can be even further investigated by analyzing Figure Figure 6 (a)-(c) which shows the rate of assertions of user call setup with respect to the progress of the network operation for switches 5, 20, and 45, using 20processors. The high peaks in a few of the graphs describe the longer call setup times that some of the 20% of intergroup calls experience. It may be observed that the behavior of the call setup time, for all involved calls, during simulation time are not one of the continual increase which characterizes a stable network for this traffic.

4

Conclusion

This paper presents the stability study for the distributed call processing described in [1] for a real high-speed high-scale Private-Network-Network-Interface (PNNI) ATM network [7]. The Stability study is performed for nodes using 1-, 4-, 10-, 15-, and 20-processors. the study reported here is unique in that no stability analysis has been presented for a large scale PNNI network with varied number of processors per node. The study has shown that the behavior of the call setup time, for all involved calls, during simulation time are not one of the continual increase which then characterizes a stable network for the particular traffic. In addition to uncovering the significance of distributed call processing in future ATM networks, this study offers a systematic and scientific approach, through behavior modeling and asynchronous distributed simulation, to examine network

548

R. Citro and S. Ghosh

stability and validate proposed ATM call processing architecture designs under realistic conditions. Also, since more complex topological networks are expected to be introduced especially to support geographically disperse centers, network stability must be predicted before actual implementation.

References 1. Ricardo Citro, Distributed Call Processing and Reconfigurable Buffer Management Architectures in Asynchronous Transfer Mode Networks, PhD Dissertation, Networking and Distributed Algorithms Lab., Department of Computer Science and Engineering, Arizona State University, May 1999. 2. Tony Lee and Sumit Ghosh, A Distributed Approach to Real-Time PayementsProcessing in a Partially-Connected Network of Banks, Journal of the Society for Computer Simulation, San Diego, CA 92177, Vol. 62(No. 3):180–201, March 1994. 3. Sumit Ghosh and Tony Lee, Modeling and Asynchronous Distributed Simulation: Analyzing Complex Systems. IEEE Press, June 2000 4. Tony Lee and Sumit Ghosh. On “Stability” in Asynchronous, Distributed, Decision-making Systems. IEE Transactions on Systems, Man, and Cybernetics, 30, Part B(4):549–561, August 2000. 5. Chengzhi Li, Raba, A and Wei Zhao, Stability in ATM Networks, Proceedings of IEEE INFOCOM ’97, Vol. 1:160–167, 1997. 6. “MCI Systems Technical Documentation”. (www.mci.com), 1998. 7. “ATM Foruim Technical Committee. Private Network-Network Interface Specification Version 1.0 (PNNI 1.0). Internet version af-pnni-0055.000”, (available online:www.atmforum/atmforum/specs/approved.html (March)), 1996.

Proposed Architectures for the Integration of H.323 and QoS over IP Networks Rafael Estepa, Juan Leal, Juan A. Ternero, and Juan M. Vozmediano ´ Area de Ingenier´ıa Telem´ atica, Universidad de Sevilla Camino de los Descubrimientos s/n, E-41092 Sevilla {rafa, jleal, jternero, jvt}@trajano.us.es

Abstract. The voice service over IP networks (VoIP), as a supplement, substitution or evolution of classic telephone service, is being developed due mainly to economical reasons. However, it faces the lack of quality of service (QoS) guarantees in IP networks. The joint use of the QoS scheme proposed by the IETF and the VoIP architecture proposed by the ITU-T (H.323) implies a number of interoperation issues that must be addressed. On one hand, it is necessary to maintain information on the users’ authorization in each of the systems. On the other, both services must be billed. This article first describes the state of art of QoS in IP networks and H.323. Next, five architectures for the integration of the IETF QoS and the H.323 schemas are proposed. For each of these architectures, features, advantages and shortcomings are analyzed. Finally, three scenarios using the proposed architectures are studied.

1

Introduction

This section introduces a short description of VoIP, continues with QoS support on IP networks, and ends setting up the problems of user authorization1 . 1.1

VoIP Schemes

Early standards [1] on voice transport over packet based networks without QoS guarantees come from the International Telecommunications Union - Telecommunication Standardization Sector (ITU-T). Recommendation H.323 [2] is the main ITU-T standard for VoIP. It is an architectural standard which refers to other specific standards on signaling [3,4] inter-gateway communication [5], supplementary services [6], etc. These standards define the necessary elements for voice transmission over this kind of networks, namely: – Terminals: communication endpoints, equivalent to telephone handsets, which allow users to maintain audiovisual communications. – Gatekeeper: server that performs centralized tasks, such as directory services, aliases and telephone numbers translation, call control, billing, etc. 1

The work leading to this article has been partly supported by CICYT and the EU under contract number 1FD97-1003-C03-03.

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 549–558, 2001. c Springer-Verlag Berlin Heidelberg 2001 

550

R. Estepa et al.

– Gateway: it makes possible the communication between H.323 terminals and PSTN terminals like POTS, ISDN, GSM, etc. – MCU (Multipoint Control Unit): it supports conferences among three or more endpoints. The collection of all Terminals, Gateways, and Multipoint Control Units managed by a single gatekeeper is known as H.323 zone. Terminals can either set up calls on their own or using Gatekeepers, which are optional. When Gatekeepers receive set up requests from terminals, they are responsible for locating the destination, accepting or rejecting the call and, optionally, routing the signaling and/or media streams. The decision of whether to route the signaling and media or not corresponds to the Gatekeeper. Alternatively, the Internet Engineering Task Force (IETF) has proposed a different VoIP model known as Session Initiation Protocol (SIP) [7] which is not considered in this work. At the moment, work is being done on the harmonization of both scenarios (H.323 and SIP). The European Telecommunication Standardization Institute (ETSI), in the Telephony and Internet Protocols Harmonization Over Networks (TIPHON) [8] program, is one of the main organizations working on this respect. However, neither SIP nor H.323 overcome the lack of QoS supporting mechanisms, which is the main VoIP limitation. This fact is nowadays the most important difference between switched circuit and packet based networks, and is crucial for the success and universal deployment of VoIP [9]. 1.2

QoS over IP Networks

In order to assure a certain QoS parameters (bandwidth, delay and packet loss) to data flows containing time sensitive information (such as coded voice), a number of methods are being developed [10]. The IETF developed the Integrated Services (IntServ) [11] model, which defines three classes of service based on application’s delay requirements. These are the Guaranteed-Service (GS) [12] class, which provides for delay-bounded service agreements; the Controlled-Load (CL) [13] service class, which provides a form of statistical delay service agreements (nominal mean delay) that will not be violated more often than in an unloaded network and the well-known best-effort service. The Resource Reservation Protocol (RSVP) [14] is used for signaling in the former two service classes. Sender and receiver periodically send RSVP messages (reservations are maintained in a ‘soft’ state) and these messages make the routers to reserve resources. The support of per flow guarantees poses severe scalability problems. RSVP is useful for access networks, but demands high capacity in the core as the number of flows grows [10]. The Differentiated Services (DiffServ) [15] architecture was developed by the IETF to leverage that scalability problem. This architecture simplifies the operation of the intermediate nodes, moving the complexity to the edge nodes. DiffServ may be used in conjunction with IntServ applied in different parts of a network; the former in the core and the latter in the edge [16].

Integration Architectures for QoS over IP Networks

1.3

551

Authorization Issues

Independently of the architecture used, two conditions must be fulfilled for a QoS request to be granted. In the first place, enough resources must be available. Secondly, the administration system must authorize the request. Because of the complexity of the authorization problem, which depends on multiple factors, the IETF has defined the Policy Based Admission Control architecture [17]. This architecture consists of two fundamental elements: the Policy Decision Point (PDP), which acts as authorization server, and the Policy Enforcement Point (PEP), which uses the Common Open Policy Server (COPS) protocol [18] to communicate with PDP. PEPs must reside in the routers while the PDPs are generally separate servers. Interdomain authorization is another aspect of the problem, but it’s generally assumed that it will be addressed by Service Level Agreements (SLA). Moreover, as mentioned above, both H.323 and QoS schemes rely on centralized servers (Gatekeepers and PDPs respectively): The PDP is the element that directly controls the QoS policies applied on routers, while Gatekeepers are necessary for the optimal control of Gateways, aliases and telephone numbers translation, signaling and media routing, call control, etc. Both types of servers complement each other for providing VoIP services with QoS support. Besides, Gatekeepers provide network based services, that is, those which need to be performed independently of the terminal or when the terminal is turned off (e.g. registration, admission, monitoring availability, call redirection, etc.). Next section describes five alternative architectures for the integration between Gatekeepers and PDPs. The analysis of these architectures focuses on two administrative issues: authorization and accounting.

2

Proposed Integration Architectures

The elements involved in all the architectures are the same. Terminals, Gatekeepers and Gateways use H.323 signaling for communication set up. Once the communication is established, terminals, routers and policy servers negotiate the QoS using the RSVP and COPS protocols. Finally, terminals start transmitting the media streams. H.323 aliases to IP addresses translation and Gateways management are performed by Gatekeepers in all five architectures. These architectures are described below. 2.1

Architecture 1: No Integration

This architecture arises from the straight application of H.323 over a QoS enabled IP network. No interaction exists between H.323 servers (Gatekeepers) and QoS policy servers (PDPs), so H.323 and QoS domains work independently. Gatekeepers are responsible for terminals authorization based on their own criteria and billing for the use of gateways, while authorization and billing for the use of QoS are PDPs’ responsibility. Therefore these tasks are performed autonomously.

552

R. Estepa et al.

Terminal

GateKeeper

PDP

Router Terminal

Terminal (0)

(0)

GateKeeper

PDP

(1)

(1)

Router Terminal

(2)

(3) (4)

(2)

(5)

(3) (4)

(6) (7)

(5) (8) a) Architecture 1: No integration Terminal

GateKeeper

PDP

b) Architecture 2: PDP-based

Router Terminal

Terminal

(0)

GateKeeper

Router Terminal

(0) (1)

(2)

PDP

(1) (2)

(3)

(4)

(3) (5) (7)

(4)

(6)

(5) (8)

c) Architecture 3: Gatekeeper-based Terminal

d) Architecture 4: Switching through Gatekeeper

GateKeeper

PDP

Router Terminal

(0) (1) (2) (3) (4) (5) (6) (7) e) Architecture 5: Through LDAP

Fig. 1. Steps for call establishment in the different proposed architectures

Integration Architectures for QoS over IP Networks

553

Figure 1(a) illustrates the necessary steps to establish a call between two terminals with QoS support. The process starts when the calling party sends the Gatekeeper a call request containing the called party’s alias address (0). The Gatekeeper translates the alias to the transport address and authorizes the call based on its own criteria. If succeeded, the Gatekeeper sends the called party’s transport address back to the terminal (1), so that the terminals can establish the H.323 signaling channels (2). Once the terminals have agreed the media channels to be used, the terminals signal the QoS reservation sending RSVP messages (3). When the routers in the path receive these messages, they ask PDP for authorization (4), which responds based on its own policy, unrelated to the Gatekeeper’s (5). Attending to authorization and billing this architecture generates two different accounting records, one in the PDP for QoS and another in the Gatekeeper for gateway usage. Similarly, two separate authorization databases exist, and therefore consistency of stored data in both must be assured by administrative agreements. Consequently, this architecture is appropriate when the H.323 zone and the QoS domain belong to different organizations. Major advantages of this architecture emerge from the separation between the H.323 and QoS systems, allowing independent evolution of both technologies, thanks to the absence of interaction between their elements. Besides, this solution is extensible to other kinds of services that need QoS guarantees such as video streaming. Finally, no additional development needs to be done. Nevertheless, a terminal not registered in the Gatekeeper may obtain QoS guarantees for its calls, which constitutes an important shortcoming of this architecture. 2.2

Architecture 2: PDP Based Architecture

The PDP can be defined in short words as the QoS authorization and billing server. In this architecture the PDP works also as the VoIP server (for authorization and billing). Gatekeepers must include a PEP in order to ask the PDP for authorization, similarly to routers. Thus, QoS and VoIP authorizations are responsibility of the PDP, and the Gatekeeper’s answers to the user are based on decisions made by the PDP. The Gatekeeper must also inform the PDP of Gateway usage. Hence, the whole billing information is centralized in the PDP. Figure 1(b) shows the steps followed in this architecture. The call is initiated when the calling party sends the Gatekeeper a call request containing the called party’s alias address (0). The Gatekeeper translates the alias to the transport address and asks the PDP for authorization using COPS protocol (1). The PDP responds to the Gatekeeper granting or denying the call (2). If succeeded, the PDP records the call request in order to later authorize the QoS for that call. This forces terminals to use the Gatekeeper to obtain QoS guaranties on their calls. Then, Gatekeeper sends the called party’s transport address back to the terminal (3), so that the terminals can establish the H.323 signaling channels (4). Once the terminals have agreed the media channels to be used, the terminals signal the QoS reservation sending RSVP messages (5). When the routers in the path

554

R. Estepa et al.

receive these messages, they ask the PDP for authorization (6). The response given by the PDP to routers is consistent with that given to the Gatekeeper (7). This procedure assures that only those calls that the Gatekeeper asked permission for may obtain QoS guaranties. Finally, the Gatekeeper informs the PDP about gateways usage for billing purposes (8). The previous description shows that authorization tasks are dealt on the PDP, which simplifies administration but imposes a tight relationship between the PDP and Gatekeepers. Consequently, this architecture is suited when the H.323 zone and QoS domain belong to the same organization. One of the main advantages of this schema is forbidding unregistered terminals to obtain QoS for their calls. This implies that the use of Gatekeepers is mandatory. The main shortcoming is scalability, which derives from its centralized structure. For huge networks the PDP might become a bottleneck and its administration can be complex. Also, the request from the Gatekeeper to the PDP increases call set-up time. Besides, COPS usage for H.323 must be defined, which does not allow independent evolution of H.323 and QoS technologies. 2.3

Architecture 3: Gatekeeper Based Architecture

Gatekeepers are considered centralized servers in the H.323 standard. Their missions are, among others, authorization, billing and bandwidth management. From this point of view, it is reasonable that gatekeepers control QoS authorization and billing for H.323 terminals, that is, they perform some of the PDP’s functionalities. In order to do that, the Gatekeepers ask the PDP to authorize QoS requests to be made by H.323 terminals and the PDP reports the Gatekeepers about resource usage necessary for billing. Besides, for the Gatekeeper to know the parameters of the media channels used for the call, it must route terminals’ signaling. The process to establish a typical call with QoS using this architecture is shown in figure 1(c). The process starts when the calling party sends a call request containing the called party’s alias address to the Gatekeeper (0). This Gatekeeper translates the alias to the transport address and authorizes the call based on its own criteria. If succeeded, it sends the called party’s transport address back to the terminal (1). The terminals establish the H.323 signaling channels using Gatekeeper-based routing (2). Once the terminals have agreed the media channels to be used, the Gatekeeper requires the PDP to grant the QoS using COPS protocol (3). After that, the terminals start sending RSVP messages (4). When the routers along the path receive these messages, they ask the PDP for permission (5), which responds based on the previous Gatekeeper requirement (6). When the communication is over, the Gatekeeper demands the PDP to revoke the authorization (7), and the PDP reports QoS usage to the Gatekeeper for billing purposes (8). Authorization and billing in this architecture are centralized in the Gatekeeper, which simplifies administration and allows separate management of H.323 zones. However, the PDP must trust the Gatekeepers for VoIP QoS request au-

Integration Architectures for QoS over IP Networks

555

thorization. Therefore, this architecture is appropriate in case H.323 zone and QoS domain belong to the same organization. This architecture, as the previous one, forbids unregistered terminals to obtain QoS for their calls, so the use of Gatekeepers is mandatory. One problem of this architecture is that it forces the dependent evolution of H.323 and QoS technologies. Besides, COPS usage for H.323 must be defined. Another problem is that the signaling through the Gatekeeper and the communication between the GateKeeper and the PDP delays the call set-up completion. 2.4

Architecture 4: Call Switching through Gatekeeper

This architecture arises when considering that the Gatekeeper can route the whole calls, this is, signaling and media channels. This behavior resembles PABXs in circuit switched networks. Terminals establish their connections to their local Gatekeeper. Calls to and from the Gatekeeper are always granted in the PDP in a hard state, so no communication between those elements is needed. It is mandatory for Gatekeepers to support RSVP, so terminals without RSVP signaling can get QoS support in the path between the Gatekeeper and the remote terminal. Figure 1(d) shows the steps followed this architecture. As usual, the call is initiated when the calling party sends the Gatekeeper a call request containing the called party’s alias address (0). The Gatekeeper then translates the alias to the transport address and authorizes the call based on its own criteria. If succeeded, the Gatekeeper sends its own transport address back to the terminals (1), so that the terminals can establish the H.323 signaling with the Gatekeeper (2). Terminals and Gatekeepers reserve the QoS for the media streams which will be routed by the Gatekeepers (3). When the routers in the path receive the RSVP messages, they ask the PDP for authorization (4), which responds allowing the reservations, because all the calls to and from Gatekeepers are always authorized (5). As described above, authorizations and billing are centralized in the Gatekeeper, easing the management. This architecture is, thus, suitable for independent administration of H.323 and QoS zones. Athough there is no communication between the GateKeeper and the PDP, the signaling through the GateKeeper and the RSVP reservation in the path through the Gatekeeper increase call set-up time. Once the call is established, forcing the voice packets through the Gatekeeper will also increment the delay. Besides, this route may be non optimal. The Gatekeeper may also became a bottleneck when there are many terminals per H.323 zone. 2.5

Architecture 5: Interaction through LDAP

In this architecture, H.323 terminals’ authorizations are centralized on the Gatekeeper and, therefore, VoIP users must only be provisioned in the Gatekeeper’s database, but not in the PDP’s. Since the PDP’s database can be accessed

556

R. Estepa et al.

through LDAP (Lightweight Directory Access Protocol), the Gatekeepers dynamically update the database of the PDP, so authorizations made by the PDP are consistent with those made by the Gatekeepers. The Gatekeepers must route terminals’ signaling in order to know the parameters of the media channels used for the call, and appropriately update PDP’s database. The process for setting up a call is shown in figure 1(e). Upon the reception of a call request containing the called party’s alias address (0), the Gatekeeper translates the alias to the transport address and authorizes the call based on its own criteria. If succeeded, it sends the called party’s transport address back to the terminal (1). The terminals establish the H.323 signaling channels, using Gatekeeper-based routing (2). Once the terminals have agreed the media channels to be used, the Gatekeeper updates the LDAP database of the PDP (3). Then, the terminals signal the QoS reservation sending RSVP messages (4). When the routers in the path receive these messages, they ask the PDP for authorization (5), which responds based on the previous Gatekeeper indication (6). When the communication ends, the Gatekeeper updates the PDP’s authorization LDAP database for that terminal, restoring its original state (7). Authorization in this architecture is centralized in the Gatekeepers, which simplifies administration and allows separate management of H.323 zones. However, regarding accounting, this architecture generates two different records: one in the PDP for QoS and another in the Gatekeepers for gateway usage. This architecture is appropriate when the different H.323 zones are independently managed, but the QoS administration is unique. A great advantage of this architecture, like those where the Gatekeeper centralizes the authorizations, is denying QoS authorization for the calls of non registered terminals, so in this architecture the use of Gatekeepers is mandatory. The drawback of this architecture is that it forces the Gatekeeper to specify authorizations in the LDAP policy representation schema. Call set-up delays are similar to those in the Gatekeeper-based architecture, where there is signaling through the GateKeeper and communication between the Gatekeeper and the PDP.

3

Applications

From the previous discussion of these architectures derives that no optimal architecture for every possible scenario exists. Accounting integration is a requirement when VoIP services with QoS guarantee are provided and billed. However, accounting integration does not provide any advantage when one of the services is either not billed or included in the other. This may happen when providing VoIP without quality guarantees or when billing only QoS, be it utilized by VoIP traffic or by any other. To show that there is not an optimal solution common to every case, three particular scenarios using H.323 and QoS over IP networks can be considered. For each of them, different integration architectures will be suitable.

Integration Architectures for QoS over IP Networks

557

The first scenario consists of a network formed by multiple LANs connected to a backbone whose resources must be optimized, and linked to the PSTN through a number of Gateways. The whole network is administered by a unique organization. This is the typical case in corporate networks or university networks. Let this network be QoS enabled. To provide H.323-based VoIP services, Gateways and Gatekeepers should be placed in the network splitting it in zones which optimize network utilization. The administration of each H.323 zone could be the responsibility of every organizational unit, while the global QoS policy would normally be decided by the management center, unique to the whole organization. Therefore, the most appropriate architecture for this scenario would be the interaction through LDAP (architecture 5). Using this architecture, administrators of every H.323 zone do not need to register in the management center every new user in their zone. Instead, users would be automatically authorized in the QoS system when provisioned in the Gatekeeper. The fact that using this architecture Gatekeepers have access to the PDP’s LDAP database is not a concern, as administrators of each H.323 zone and the QoS system belong to the same organization. Let us consider a second scenario consisting of a local Internet Service Provider (ISP), QoS enabled network over which the ISP desires to offer H.323 based VoIP service to its subscribers. These networks typically consist of one or more access systems using ADSL, cablemodem or PSTN access, a number of servers for mail, web, etc. and a router that provides Internet access. These elements are connected by a private high speed network. In local ISP networks, there are few Gatekeepers and are located in the servers segment, while PDP is connected to the network management segment. From the management point of view it is desirable that, on one hand, user provisioning is unique and, on the other hand, accounting for both services is obtained together so users can be billed for all the resources used in their VoIP calls (that is, QoS and Gateway usage) at the same time. Therefore, for this scenario the most appropriate architectures would be number 2 (PDP based) and number 3 (Gatekeeper based). These architectures are feasible because Gatekeepers and PDPs belong to the same organization, so the relationship between them can be very close. Finally, a third scenario is a variation of the previous one, in which VoIP service is provided by an separate organization. The VoIP service provider uses the ISP’s access network. VoIP subscribers do not need to sign up for the ISP service. Instead, the VoIP service provider bills its subscribers for the whole service (Gateway and QoS usage). Because Gatekeepers and PDPs belong to different organizations, interaction between them is discouraged. Therefore architectures number 2, 3 and 5 are inappropriate. Both of the remaining architectures are possible. Architecture number 1 requires administrative communication between ISP and VoIP service provider for user provisioning and QoS usage reporting. Application of architecture num-

558

R. Estepa et al.

ber 4 is straightforward because billing and authorization are centralized in the Gatekeeper.

4

Conclusions

In this article, five architectures for the integration of H.323 and QoS over IP networks have been proposed. These architectures achieve different degrees of interaction by means of various mechanisms for the communication between the H.323 Gatekeepers and the PDP. They have been analyzed regarding authorization and accounting, and the main advantages and shortcomings have been outlined. Finally, three application scenarios have been presented which lead to different optimal integration architectures. This fact shows that none of the proposed architectures is optimal for every possible scenario.

References 1. Toga, J., Ott J. ITU-T Standardization Activities for Interactive Multimedia Communications on Packet Networks: H.323 and Related Recommendations. Computer Networks, Vol. 31 (1999) 20–23. 2. ITU-T Recommendation H.323. Packet-based Multimedia communications systems. (11-2000) 3. ITU-T Recommendation H.225.0. Call signalling protocols and media stream packetization for packet based multimedia communications systems. (1999). 4. ITU-T Recommendation H.245. Control Protocol for multimedia communication. (2000). 5. ITU-T Recommendation H.248. Gateway Control Protocol. (2000). 6. ITU-T Recommendation H.450.1 Generic functional protocol for the support of supplementary services in H.323. (2-1998) 7. IETF RFC 2543. SIP: Session Initiation Protocol. (3-1999) 8. ETSI TR 101300 v2.1.1 Telecommunications and Internet Protocol Harmonization Over Network (TIPHON); Description of Technical Issues. (10-1999) 9. Li, J., Hamdi, M., Jiang, D., Cao, X. QoS enabled Voice Support in the NextGeneration Internet: Issues, Existing Approaches and Challenges. IEEE Communications Magazine. Vol 38-4 (2000) 54–61 10. Mathy,L., Edwards,C., Hutchison,D. The Internet: A global Telecommunications Solution?. IEEE Network Magazine, Vol 14-4 (2000) 46–57. 11. IETF RFC 1633. Integrated Services in the Internet Architecture: an Overview. (6-1994) 12. IETF RFC 2212. Specification of Guaranteed Quality of Service. (7-1997) 13. IETF RFC 2211. Specification of the Controlled-Load Network Element Service. (7-1997) 14. IETF RFC 2205. Resource ReSerVation Protocol (RSVP) – Version 1 Functional Specification. (7-1997) 15. IETF RFC 2475. An Architecture for Differentiated Services. (12-1998) 16. IETF Work in Progress, Bernet et al. A Framework For Integrated Services Operation Over Diffserv Networks . (5-2000) 17. IETF RFC 2753. A Framework for Policy-based Admission Control . (1-2000) 18. IETF RFC 2748. The COPS (Common Open Policy Service) Protocol . (1-2000)

Third-Party Call Control in H.323 Networks – A Case Study A. Miloslavski, V. Antonov, L. Yegoshin, S. Shkrabov, J. Boyle, G. Pogosyants, and N. Anisimov Genesys Telecommunication Labs (an Alcatel company) 1155 Market St., San Francisco, CA 94103, USA http://www.genesyslab.com

Abstract. This paper addresses the problem of building third-party call control in a VoIP network based on ITU-T Recommendation H.323. We consider a specific case that could be used in the call center environment. We will suggest and advocate a solution with H.323 gatekeepers connected to CTI Server via special protocol. The CTI Server contains all the logic for service execution (a call model) while a gatekeeper implements only elementary switching functions. Some basic features of the protocol are outlined. We also present the architecture of a real-world network where the approach is implemented.

1

Introduction

One of the most important applications of Computer Telephony Integration (CTI) is the call center (CC) [1]. The key element on which all the software of the call center relies is a CTI-link containing a communication protocol between a telephony switch and a computer that is often referred to as a CTI server. CTI protocol allows the CTI Server to monitor and control processing of telephony calls, i.e., it provides thirdparty call control. Modern call centers are comprised of complex and expensive software called call center applications that provide the processing of inbound and outbound calls from customers. For instance, a CC application may include preliminary call processing by Interactive Voice Response (IVR), routing the call to the most appropriate operator (agent), assisting the agent in call processing, managing customer relations, reporting, etc. Using emerging Voice over IP (VoIP) technologies promises to substantially improve the performance of the call center. At the same time, in order to painlessly transition from PBX-based to VoIP networks in call centers one needs to solve certain technical problems, such as how to substitute these networks without changing other call center software. In other words, we need to build third-party call control in VoIP networks in order to provide PBX-based services, such as call transfer, conferencing, and automatic call distribution. In this paper we will consider one of the solutions for the problem using the example of call center software developed at Genesys Telecommunication Labs, a wholly owned subsidiary of Alcatel. We will consider the case of when VoIP net is based on ITU-T Recommendation H.323 [2].

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 559–569, 2001 © Springer-Verlag Berlin Heidelberg 2001

560

2

A. Miloslavski et al.

The Problem

The typical structure of a call center employing CTI-link is depicted in Fig.1. The key element of the call center is a CTI-link that connects PBX and CTI Server to provide visibility and control of the switching domain by the computing domain. The CTI link makes it possible to organize call processing in a flexible way. For example, the processing of an inbound call may involve the following steps. The CTI Server learns about the incoming call due to an event received via the CTI-link. Then it routes the call to an IVR that may collect additional information about the call and the customer. Then the Router routes the call to the most appropriate agent to be processed. The telephony call is transferred along with related data. During the call processing the agent may use information from the database (about the call and the customer), may consult with another agent, organize a conference or transfer the call to another agent. To initiate all these PBX-based services the agent usually uses a special desktop application that, in its turn, exploits the third-party call control functions. It should be mentioned that the Genesys CTI Server uses a call model that has much in common with the SCTA call model [3]. Now we want to substitute the PBX network with the VoIP network based on the H.323 Recommendation. In other words we want to build a third-party call control in the H.323 network which is exactly the same as that in the PBX network. We should stress the complexity of the problem that stems from the nature of the networks. Indeed, the CTI-link assumes centralization, while H.323 is built on a distributive principle. Third-party control may require additional complex protocol to connect endpoints and CTI Server as it suggested in [4].

IVR CTI-link

PSTN Customer's phone

Database

PBX

CTI-Server

Router

LAN Agent's workplace Desktop

Fig. 1. Call Center Environment

Third-Party Call Control in H.323 Networks – A Case Study

561

One reasonable approach is to move CTI Server functions into a special server connected to the gatekeeper(s). The one example of this approach is the concept of “thin gatekeeper” developed within Dialogic [5]. According to this approach a gatekeeper is connected to a special server via CSTA protocol. This solution assumes that the gatekeeper understands and operates in accordance with CSTA protocol. However endowing a gatekeeper with CTI Server functionality is not a good solution because it will result in a complex and inflexible gatekeeper implementation. Moreover, it is not clear what to do when there are several gatekeepers in the network. At the same time, notice that CSTA has been developed to connect switching and computing domains [3]. In fact, CSTA provides a copy of the switching call model in the CTI Server. Moreover, it keeps these call models consistent using a request/event mechanism. In our point of view this solution is still complicated because in the VoIP network there is no longer any boundary between the switching and computing domains. Everything is in the computing domain and it is reasonable to have only one call model rather than two.

3

Proposed Solution

In this paper we suggest a configuration where all service logic is placed in the CTI Server while gatekeepers perform more elementary operations. 3.1

Architectural Environment

Traditionally, CTI protocols were largely vendor specific, thus forcing CTI software vendors to develop separate software modules for each switch model. A number of protocols were proposed as potential standards for CTI links, such as CSTA [3], MGCP/Megaco/H.248 [7] and newer revisions of TAPI [8]. Unfortunately, such attempts at such CTI protocol standardization are not likely to produce compatible implementations. It is easy to see that any non-trivial CTI software suite has a need to maintain an accurate replica of the switch state, which in practice means that the CTI software has to replicate the call model of the particular switch, as shown in Fig.2(i). Any discrepancy between the actual call model implemented by the switch vendor and its reverse-engineered replica in the CTI software causes loss of coherency between the actual state and its image in the control software. Worse yet, practically all switch vendors introduce subtle changes to their call model in successive versions of switch software (this is unavoidable when new features are added and programming errors are corrected). Packet-switched telephony makes call models even more complicated by replacing centralized switches with a heterogeneous, distributed switching environment. One approach to solving the problem of call model incompatibility would be to standardize the call model itself, providing a rigid specification for switch behavior. This, in practice, is a very challenging task because of the richness of possible call behavior and call control features. The current generation of telephone switches provides hundreds of these features to accommodate diverse customer requirements. Any single standard defining the switch behavior is bound to be overly restrictive;

562

A. Miloslavski et al.

therefore, vendors reacting to customer demand will be compelled to expand it, thus defeating the very purpose of standardization. As a result, none of the proposed CTI standards even attempt to specify a standard call model (beyond some elementary features), thus leaving the actual behavior of switches to the discretion of the manufacturer. While helping to solve the easy problem of CTI message format encoding and decoding, they leave the complicated task of switch behavior modeling completely untouched. In this paper we advocate another approach based on Simple Media Control Protocol (SMCP) [6] developed within Genesys Labs. The SMCP solves the behavioral compatibility problem by providing CTI software access to the basic switching functions, with no proprietary call model overlay. In SMCP architecture, a switch vendor not have to implement an elaborate call model, a thin SMCP protocol stack is sufficient. The PBX call control functionality can be external and developed separately; see Fig.2(ii). A switch vendor supporting SMCP could use third-party SMCP-based PBX call control software instead of doing costly in-house PBX design or integration. Note that in SMCP architecture, only one call model is used in CTIcontrolled operation, thus eliminating the problem of CTI software and switch call model incoherence. CTI-Server

CTI-Server CTI Server

CTI Server

Call Model

CTI-protocol Switch

Switch/PBX Software

Call Model

Thin SMCP Stack Call Control Entity

SMCP Switching Entity

Call Model

Switching Matrix

(i)

Thin SMCP Stack (no call model)

Switching Matrix

(ii) Fig.2. Old and new architectures

Third-Party Call Control in H.323 Networks – A Case Study

563

Many existing VoIP devices like phones, gateways, gatekeepers are separate devices that do not connected by common logic of services. The distributed nature of equipment and limitations on a network bandwidth result in a need to support services on a distributed basis. Thus, a CTI Server is a natural place for a centralized control of services execution. The simplicity of the SMCP model allows it to incorporate functions not generally found in conventional voice-only call models. Indeed, the call commutation model defined in this document is in no way specific to voice, and can be used to control a very wide variety of call-like interactions, such as analog voice, synchronous or packetized digital voice, interactive video, chat, whiteboard or desktop sharing sessions. 3.2

Summary of SMCP

In this section we briefly consider SMCP. The full specification could be found in [6]. 3.2.1 Basic Notions SMCP is a protocol that regulates a communication between two objects – Call Control Entity (CCE) and Switching Entity (SWE), see Fig.2 (ii). The Switching Entity is a module that fulfills only switching functions and does not aware about services. The Call Control Entity contains service logic and implements it with the aid of SMCP instructing SWE what to do in order to provide the service. Thus SMCP is a protocol of a low level that provides only basic switching functions and does not contain service logic. Note that CCE and SWE are abstract modules in the sense that their physical embodiment depends on the architecture of VoIP network. For example, if SMCP is used in an H.323 network, SWE may be implemented as a Gatekeeper. In an MGCP based network the role of SWE can be played by a Media Gateway Controller (MGC). The SMCP assumes that the SWE implements an abstraction of a commutating device allowing separate control of call legs (call leg is a half of a connection). In other words, SWE must make sure that externally visible calls are kept established even when the commutating device tears down and reestablishes internal connections between them. Fig.3 shows how the SMCP commutator model maps to a typical enterprise VoIP configuration. The call legs are terminated at endpoints and are associated with physical or virtual ports (there are situations when endpoints do not have associated ports). Some ports can be used for support of multiple simultaneous connections. The parts of call legs outside of a switch or a gateway are called exterior, connections between them inside switches are interior. More than two call legs can be connected together to form a multi party conversation. Typically, endpoints can terminate only one call leg at a time. However, in some cases (for example, call treatment sources, such as music-on-hold) a single endpoint can be connected to multiple call legs. All endpoints have unique endpoint addresses represented as ASCII character strings; such strings can be telephone numbers, URLs, E-mails, etc; the exact naming scheme is application specific. Ports have unique vendor-specific names.

564

A. Miloslavski et al.

Internet Gatekeeper/Switching Entity

Call Control Entity SMCP

SMCP Stack

SMCP Stack

LAN

Router

Gateway

External call legs virtual ports IP interface port

internal call legs

Fig.3. VoIP System as a SMCP Commutator As in many other Internet protocols (e.g., HTTP, SIP, MGCP), SMCP messages are text based, i.e., all messages may contain only ASCII printable characters, spaces and tabs. 3.2.2 Exterior Call Control The protocol consists of several procedures. However, in this paper we will consider only the main procedures related to call control. The other procedures such as configuration management, fault tolerance management, encryption, etc. are out of the scope of this paper and can be found in [6]. The exterior call control commands and events provide a mechanism for manipulating the endpoint sides of call legs. Outbound Calls. For managing outbound calls SMCP uses the following protocol data units: CALL Make an outbound call; BUSY Port is busy; CALLING Outbound call request acknowledgment; GOTCA Got call alerting from endpoint; ANSWERED Call answered; CONNECTED Connection established. Outbound calls generally progress through several stages, see Fig.4: • CCE commands SWE to initiate the connection with a CALL request. • If the request is not valid, SWE responds with an ERROR reply; if the selected port is busy, SWE responds with a BUSY reply; otherwise the request is considered valid and SWE allocates a call leg identifier and returns it to CCE with a CALLING reply. • SWE initiates a transport connection to the endpoint, and sends a Call Setup message to the endpoint.

Third-Party Call Control in H.323 Networks – A Case Study



565

The endpoint may reply with a Call Proceeding message to indicate that it accepted further responsibility for call delivery. • The endpoint may then reply with a Call Alerting message to indicate that the call has been delivered to the end-user device, which started alerting the user. • If the callee answers the call, the endpoint device replies with a Setup message, thus initiating the process of establishing a transport connection. SWE informs CCE about this event with an ANSWERED notification. • When a transport connection is established the endpoint device replies with a Connected message. After that the call is completely established, and SWE sends a CONNECTED notification to the client. • At any time after the CALLING notification, SWE may inform CCE that the connection cannot be completed with a DROPPED notification. If CCE did not send a HANGUP request for this call already, this request must be sent to release the connection after receipt of a DROPPED notification. A diagram of CCE state transitions while performing an outbound call is shown in Fig. . Note that the connection from a switch to a directly attached phone set is also an outbound call in the SMCP call model. Making outbound calls generally requires specification of a switch or gateway port, and the additional target address (which can be for directly attached devices, can contain an E.164 phone number for PSTN calls, or an E-mail address or URL for VoIP calls). If SWE implements a numbering plan, the port specification may be omitted and selected automatically by the target address using the plan's target lookup table.

Fig. 4. CCE State Machine for Outbound Calls

566

A. Miloslavski et al.

Incoming Calls. For managing inbound calls SMCP uses the following protocol data units: Notify about incoming call; RING Send Call Proceeding message; SENDCP SENDCA Send Call Alerting message; ANSWER Answer the call. A typical incoming call scenario is: • SWE detects the incoming attempt to establish a transport connection, accepts the transport connection, and reads the Setup message. • SWE alerts CCE about the incoming call with a RING notification. • CCE may instruct SWE to send a Call Proceeding message to the calling party with a SENDCP request, and wait for an OK reply. • CCE may then instruct SWE to send a Call Alerting message to the calling party with a SENDCA request, and wait for an OK reply. • When CCE wishes to answer the call, it asks SWE to perform the transport protocol negotiation with the ANSWER request, and wait for an OK reply. • SWE informs CCE about success or failure of the negotiation; if the negotiation was successful the connection is considered established and SWE sends a CONNECTED notification to the CCE. • At any time after the original RING notification, SWE may inform CCE that the connection was abandoned with a DROPPED notification. If CCE did not send a HANGUP request for this call, this request must be sent to release the connection after receipt of a DROPPED notification. • After receiving any reply or notification pertaining to the current call leg CCE may command SWE to drop the connection with a HANGUP request. After issuing the HANGUP request CCE should wait for the DROPPED notification from SWE before assuming that the port is available. A diagram of CCE state transitions while answering an incoming call is shown in Fig.5. Call Release. An established connection may be released by either the local or remote party. CCE may request releasing the call leg with a HANGUP request. When the call is dropped due to an endpoint's action or a transport disconnection, SWE sends a DROPPED notification to CCE. CCE then must release the call leg with a HANGUP request. SWE may reuse the call leg identifier only after it has sent a DROPPED notification and received a valid HANGUP request. 3.2.3 Interior Media Stream Commutation The interior media stream commutation allows interconnecting existing exterior call legs in an arbitrary manner. The connections are established with a MAKE request and are torn down with BREAK or HANGUP requests. It is important to note that interior connections for different media streams related to the same call leg are different connections, and can be independently established or torn down. MAKE - Make Connection between Call Legs BREAK - Break interior connection between call legs

Third-Party Call Control in H.323 Networks – A Case Study

567

Fig. 5. CCE State Machine for Incoming Calls 3.3

Third-Party Service Creation

Exterior and interior leg control procedures allow one to develop different services whose logic is placed into the CTI Server as in Figure 2 (ii). In particular there may be standard PBX-based services like Plain Old Telephone Service (POTS) and complementary services like Call Transfer, Call Forwarding, Conferencing, Call Hold, etc. Moreover, we can design specific services that are not supported by standard PBXs. For example, the implementation of Hold/Retrieve service is simply implemented by SMCP PDUs BREAK and MAKE, respectively. The two-step transfer consists in sending PDUs BREAK, MAKE and HANGUP for corresponding legs.

568

4

A. Miloslavski et al.

Architecture of SMCP Network

In Fig.6 the real-world architecture of VoIP network with SMCP is presented. It assumes using three additional modules: CTI-Server, Distributed Media Exchanger (DMX) and Stream Manager (SM). • CTI Server contains a logic of a call model and complementary services, supports address resolution functions, and provides an interface with thirdparty applications; • DMX talks with H.323 units (endpoints, gateways, MCUs) according to H.225 and H.245 recommendations, reports to CTI Server about events, executes commands from CTI Server, and controls SM; • SM commutes media streams playing a role of a proxy, converts codecs if necessary and plays files to stream channels (e.g., playing a music file while the connection is on hold).

5

Conclusion

In this paper we suggested an approach to the design of third-party control in H.323 networks primarily intended for use in a distributed call center environment. This approach is based on a new protocol called SMCP that connects a CTI Server with elements of a H.323 network. The main distinction of this approach is that it contains only one call model that is maintained by the CTI Server. On the one hand this approach makes it possible to eliminate unnecessary complexity from the elements of H.323 networks. On the other hand, it gives more flexibility in creating third-party services for call center operation. For example we can develop more specific services for call centers than are allowed by approaches based on conventional CTI protocols like CSTA.

CTI-Server

SMCP

SMCP

H.225/H.245

Other DMXs

H.225/H.245 DMX

H.323 Phone

H.225/H.245

RTP/RTCP

RTP/RTCP

RTP/RTCP

H.323 Endpoint

H.323 Phone

H.225/H.245

RTP/RTCP

SM

Fig.6. VoIP network with SMCP.

H.323 Endpoint

Third-Party Call Control in H.323 Networks – A Case Study

569

Acknowledgments The authors are grateful to David Solnit and Steven Hamilton for technical help.

References 1. 2. 3. 4. 5. 6. 7. 8.

R.Walters. CTI in Action, Wiley, 1997. ITU-T Recommendation H323. “Packet-Based Multimedia Communication Systems”, Geneva, Switzerland, September 1999. ECMA-269. Services for Computer Supported Telecommunications Applications (CSTA) Phase III, 3rd edition, December 1998. See http://www.ecma.ch N.Oliver, T.Miller, J.D. Smith (Eds) Notes on CSTA in IP Telecommunications, Working paper by ECMA TC32-TG11, 15 May, 2000. M. Robins. Pain-Free Internet Telephony-Powered CT-Apps, Internet Telephony Magazine, August 1999. V.Antonov, L.Yegoshin. Simple Media Control Protocol, Genesys Telecommunication Labs. October 2000. See http://www.genesyslab.com T.Taylor. Magaco/H.248: A New Standard for Media Gateway Control. IEEE Communication Magazine. October 2000, Vol.38, No.10, pp.124-132. IP Telephony with TAPI 3.0. White Paper. Microsoft Corporation.

Measurement-Based MMPP Modeling of Voice Traffic in Computer Networks Using Moments of Packet Interarrival Times 1

2

N.S. Kambo , Dervis Z. Deniz , and Taswar Iqbal

2

1

2

Department of Industrial Engineering Department of Electrical and Electronic Engineering Eastern Mediterranean University Gazi Magusa, Mersin 10, Turkey. Tel: +90-392-630-1300 Fax: +90-392-365-0240 [email protected]

Abstract. In this paper we propose a novel technique for modeling packet voice traffic in computer networks based upon the measurement and estimation of the first three moments of packet interarrival times. The moments of an interarrival process are estimated using the approximation technique proposed in [1] which is applicable to any arbitrary interarrival time distribution. We then use a technique based on the pioneering method of Heffes and Lucantoni [2] for approximating the superposition of packetized voice streams from heterogeneous sources using a correlated Markov modulated Poisson process (MMPP). This is carried out in such a way that several important characteristics of the superposed traffic are matched with those of a two-state MMPP. The performance of a voice multiplexer with heterogeneous superposed packet voice traffic is then found by modeling the multiplexer as an MMPP/D/1 queuing system. A simulation model of the system is developed. Simulation results agree more closely with results obtained by the proposed technique than by the Heffes-Lucantoni technique. Practicality of the proposed technique has been demonstrated.

1 Introduction and the Proposed Technique It is expected that the variable bit rate voice will make up a significant portion of the traffic load on broadband networks like Broadband Integrated Services Digital Networks and Asynchronous Transfer Mode networks in not too distant future. In order to design networks which meet the demands of this application, it is clear that we need a better understanding (or characterization) of the voice traffic and its behavior in queuing systems. To evaluate the performance of voice traffic multiplexed statistically in such queuing systems, there is also the need to characterize superposed traffic streams which have the properties like correlation and burstiness. To approximate the superposed voice streams, Markov modulated Poisson process (MMPP) has been used because of its ability to capture the time varying behavior of superposed voice traffic, its versatility, as well as its analytical tractability in queuing performance evaluation. The matching of the characteristics of the MMPP and the P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 570–578, 2001 © Springer-Verlag Berlin Heidelberg 2001

Measurement-Based MMPP Modeling of Voice Traffic in Computer Networks

571

superposed voice traffic is focused upon in such a way that MMPP satisfactorily approximates the important characteristics of the approximated process (superposed voice streams). Various matching techniques have been proposed in the literature [25]. In this paper the powerful pioneering technique of Heffes and Lucantoni [2] is modified by using distribution free approximations to the moments of a renewal process given in [1]. This results in a simplified technique and has the following advantages over the Heffes et. al. technique: 1.

2. 3.

The new technique is based on the first three moments of the interarrival time between voice packets; estimated from the real traffic. While in [2], an a priori interarrival time distribution is assumed. Hence, the new technique is independent of the interarrival time distribution. Proposed technique does not require numerical inversion of Laplace transforms as in [2]. Finally, in [2] steady state behavior of traffic is modeled whereas it is found that the new technique approximates both the transient (to some extend) and the steady state behavior of the arrival rate, the index of dispersion for the counts (variance-to-mean ratio), and third central moment of the number of arrivals of the superposed traffic streams.

The derivation of the technique is as follows. Consider a two-state MMPP. Let σ 1−1 and σ 2−1 be the mean sojourn times of the underlying Markov chain in states 1 and 2, respectively and λ j ( j = 1, 2 ) be the arrival rate of the Poisson process when the chain is in state j. Heffes and Lucantoni [2] chose the four parameters σ 1 , σ 2 , λ 1 and λ 2 of the approximating two-state MMPP so that the following four characteristics of the superposition are matched with the corresponding characteristics of the MMPP: 1. 2.

E[ N S (0, t )] ; t →∞ t var[ N s (0, t1 )] of the number of arrivals in (0, t1 ) ; The variance-to-mean ratio E[ N s (0, t1 )]

The steady-state mean arrival rate lim

var[ N s (0, t )] of the number of arrivals; E[ N s (0, t )]

3.

The long term variance-to-mean ratio lim t →∞

4.

The third central moment µ3S (0, t2 ) of the number of arrivals in (0, t2 ) .

Here, N s (0, t ) denotes the number of arrivals in (0,t) for the superposed traffic. Expressions for the mean, variance-to-mean ratio and third central moment of the MMPP with parameters, σ 1 , σ 2 , λ 1 and λ 2 are given in [2]. Using these expressions, the above characteristics 1-4 can be obtained. Further, we can use the following approximations [1] for the moments of the number of renewals, N (0, t ) , in (0,t) to find the above four characteristics for the superposed traffic:

572

N.S. Kambo, D.Z. Deniz, and T. Iqbal

t M 1 (t ) = E  N (0, t ) ≈ µ M 2 (t ) − M 12 (t ) = Var[ N (0, t )] ≈

+

( µ 2′ − 2 µ 2 ) 1 − e s1 t 2µ 2

(

).

(1)

 2σ 2 3 5σ 4 2 µ 3'  σ2 − t+ 2 + +  3 4 4 µ 4 3µ 3  µ  µ

 5σ 2 1 σ 4 2 µ '  1  −  2 + + 4 − 33  e s1t +2tE1  + E1s1  e s1t − E12 e 2 s1t . 2 µ 2 3 µ µ µ    

M 3 (t ) = E [N 3 (0, t )] ≈ E1 +

(2)

 1 12 E1 18 E1 36 E12 + 2 2 + − 6 E12  − E1  µs 1 µ s1 µs 1   s1

 1 12 E1 18 E1 18 E12  2  3 9 E1  t 3 +t + + 2 +  + t  2 + 2  + 3 µ µ s1 µ  µ  µ µ µ  1  12 E 1 18 E 1 36 E12 + − E1 − − 2 2 − + 6 E12  − E 1  e s t µs 1 µ s1 µs 1  s1   1

18 E12  +t  − 6 E12 (1 − E1s1 ) e s1t + t 2 3E12 s1 − E1 s12  e s1t .    µ 

(

)

(3)

 ′2 ′ where E1 = ( µ 2′ − 2 µ 2 ) 2 µ 2 , s1 = 6 µ (µ 2′ − 2 µ 2 )  3 µ 2 − 2 µµ 3  , µ n' = E ( X n ),   µ = µ1' and X is the interarrival time random variable. This matching procedure leads to the proposed method. It may be remarked here that the approximation for M 1 (t ) is exact when the interarrival time distribution is exponential, 2-Erlang or a mixture of two exponentials. The approximations are valid provided ( s1 ≤ 0 ) . Kambo [1] has shown that s1 is indeed non-positive when the interarrival time distribution is uniform, gamma, m-stage mixed exponential, lognormal or Weibull.

2 Numerical Results In Heffes-Lucantoni [2] the packet arrival process from a single ON-OFF voice source is considered as a renewal process with interarrival cumulative distribution function (cdf) given by;

FX (t ) = [(1 − α T ) + α T (1 − e

− β (t −T )

(4)

)] U (t − T ) , t ≥ 0 .

where U (t ) is the unit step function, α -1 is the mean duration of talkspurt, β mean duration of silent period and T is the interpacket time.

-1

is the

Measurement-Based MMPP Modeling of Voice Traffic in Computer Networks

573

The results of the study using the proposed technique, the simulation model developed and the Heffes-Lucantoni technique are given in Figures 1-5. All simulation results are obtained are within 95% confidence intervals. In these graphs the parameter values of α −1 = 352 ms , β −1 = 650 ms and T = 16 ms are used. In Figures 1-3, plots for mean, variance-to-mean ratio and third central moments of the number of arrivals in the case of a single voice source are shown. The plots of the mean and third central moment are shown in Figures 4 and 5 for twenty superposed ON-OFF sources. It is observed from these figures that in the transient part of the curves Heffes and Lucantoni technique underestimates the mean but overestimates the variance-to-mean ratio as well as the third central moment. The results of the proposed method agree with those obtained using the simulation results. In steadystate all the results agree. 60

Mean no. of arrivals

50

- Proposed o Heffes-Lucantoni * Simulated

40

30

20

10

0

0

0.2

0.4

0.6

0.8

1 1.2 time (sec.)

1.4

1.6

1.8

2

Fig. 1. First moment of the counting process for a single voice source

Next, the performance of the proposed matching technique for MMPP based modeling of superposed voice traffic is evaluated. We model the statistical multiplexer as an MMPP/D/1 queue. This means that the input consisting of superposition of voice streams to the multiplexer is approximated by a two-state MMPP and a fixed packet service time (transmission time on the line) is used. For calculation of the mean and variance of waiting time in steady state the method given in Heffes & Lucantoni [2] is followed. The results are also obtained by specializing the Lucantoni [9] (p. 40-42) results for the 2-state MMPP/G/1 queue to the

N.S. Kambo, D.Z. Deniz, and T. Iqbal

18 16

- Proposed o Heffes-Lucantoni * Simulated

variance-to-mean ratio

14 12 10 8 6 4 2 0

0

0.2

0.4

0.6

0.8

1 1.2 time (sec.)

1.4

1.6

1.8

2

Fig. 2. Variance-to-mean ratio of the counting process for a single voice source

8000 7000 Third central moment of no. of arrivals

574

6000

- Proposed o Heffes-Lucantoni * Simulated

5000 4000 3000 2000 1000 0

0

0.2

0.4

0.6

0.8

1 1.2 time (sec.)

1.4

1.6

1.8

2

Fig. 3. Third central moment of the counting process for a single voice source

Measurement-Based MMPP Modeling of Voice Traffic in Computer Networks

575

MMPP/D/1 queue case. The results obtained by both methods agreed. Table 1 gives these results for different number of superposed sources. Simulation results for the mean and the variance of the waiting times in the queue are found to be more close to the results obtained by the proposed technique than the results obtained by the HeffesLucantoni technique. All simulation results in Table 1 are obtained using 100,000 packet completions and thirty replications, except the one for 120 sources which is obtained using 1 million packet completions with thirty replications. Figure 6 depicts the comparison of variance-to-mean ratio of the actual generated traffic, and the matched MMPP process using the proposed and the Heffes-Lucantoni technique. It is observed that the variance-to-mean ratio curve for the traffic is quite close to the matched MMPP process curve using the proposed technique and Heffes-Lucantoni technique over estimates this curve. 1200 - Proposed

Mean no. of arrivals

1000

o Heffes-Lucantoni

800

600

400

200

0

0

0.2

0.4

0.6

0.8

1 1.2 time (sec.)

1.4

1.6

1.8

2

Fig. 4. First moment of the counting process for twenty superposed voice sources

It is also noticeable that the first moment approximation in the proposed matching technique starts characterizing the non-linear behavior of the first moment of the arrival process and it is in good agreement with the simulated results. This phenomenon is true even when the number of superposed sources is increased and at high traffic intensities. In order to characterize the burstiness as well as correlation properties of the approximated process, the approximating two-state MMPP is fitted to the approximated process by matching the variance-to-mean ratio of the approximated and approximating processes [2]. Now in order to find the best approximation over a reasonably large range that can be considered as an entire range of variance-to-mean ratio the following technique suggested in [4] is used:

576

N.S. Kambo, D.Z. Deniz, and T. Iqbal

16

x 10

Third central moment of no. of arrivals

14

4

- Proposed o Heffes-Lucantoni

12 10 8 6 4 2 0

0

0.2

0.4

0.6

0.8

1 1.2 time (sec.)

1.4

1.6

1.8

2

Fig. 5. Third central moment of the counting process for twenty superposed voice sources

18 16

variance-to-mean ratio

14

- Proposed o Heffes-Lucantoni * Traffic

12 10 8 6 4 2 0

0

0.2

0.4

0.6

0.8

1 1.2 time (sec.)

1.4

1.6

1.8

2

Fig. 6. Variance-to-mean ratio of traffic and its comparison with the matched MMPP process

Measurement-Based MMPP Modeling of Voice Traffic in Computer Networks

i) ii)

577

Start with any values of t1 , t 2 and calculate the parameters of 2-state MMPP. Using the parameters obtained in step (i) find the variance-to-mean ratio of the two-state MMPP using the given equation. Calculate the error which is the sum of the squared deviations of variance-tomean ratio’s, one obtained in step (ii) and the other one being approximated. Repeat steps (i) to (iii) until the error is less than a given tolerance.

iii) iv)

In this work the duration of the matching range is chosen to be 20 seconds for the variance-to-mean ratio to match. The above selection seems reasonable because the approximated quantities reach their steady-state behavior reasonably well within this time duration. The accuracy used in this work is 10 −6 and 200 points are considered to calculate the error. It is verified that the value of t 2 has a marginal effect on the fitting procedure. This is in accordance with the findings of [2]. The parameters of the two-state MMPP that result in minimum error are considered for the approximation purposes. It is also found that the fitting procedure is independent of the number of sources being approximated. The variance-to-mean ratio curves for the approximated and approximating processes for all the matching techniques mentioned above after implementing the fitting algorithm are obtained. The first two moments of waiting time for different matching techniques as well as the simulation are obtained and plotted. Table 1. First two moments of waiting time in an MMPP/D/1queue obtained using the HeffesLucantoni and the proposed techniques for different number of superposed sources, N ( α −1 = 0.352 s, β −1 = 0.65 s and T = 0.016 s)

E1 (w) = Mean waiting time for the Heffes-Lucantoni matching technique E2 (w) = Mean waiting time for proposed matching technique E3 (w) = Mean waiting time obtained using the simulator SD = Standard deviation

N

ρ

E1 (w) m sec.

E2 (w) m sec.

E3 (w) m sec.

SD1

SD2

SD3

m sec.

m sec.

m sec.

20

0.1464

0.02905

0.02876

0.0276

0.08538

0.08650

0.09717

40

0.2927

0.07063

0.06963

0.0706

0.14262

0.14653

0.20331

60

0.4391

0.1355

0.1324

0.1338

0.21939

0.22695

0.33184

80

0.5854

0.2524

0.2419

0.2354

0.34286

0.36610

0.49788

100

0.7318

0.5395

0.4857

0.4366

0.61945

0.72877

0.83339

120

0.8782

3.1870

1.6912

2.6110

2.23740

4.82882

8.81915

578

N.S. Kambo, D.Z. Deniz, and T. Iqbal

3 Conclusions In this paper a novel parameter matching technique is proposed that uses the measurement based estimation of the moments of interarrival times presented in [1] and the general technique proposed in [2]. It has several advantages over the techniques it is based upon. One of the advantages is its practicability since on-the-fly measurements and estimation of first three moments of any traffic source can be carried out; the technique of [1] is distribution independent. This has been demonstrated through the cases presented in the results section. A matching range of 20 seconds is found to be satisfactory to adequately match the proposed parameters allowing real-time implementation of the technique. An additional advantage is the fact that the proposed technique does not require numerical inversion of Laplace transforms for estimating the moments of the arrival process to be used, hence improving practicability. Due to these features, transient behavior of voice traffic may also be reasonably modeled if sufficient time horizon is allowed. The potential of the new technique is encouraging. Application of the technique to new cases and its extension for characterizing the multi-media traffic is an exciting research direction.

References 1. Kambo, N.S.: Distribution Free Approximations to Moments of a Renewal Process. Unpublished work. 2. Heffes, H., Lucantoni, D.M.: A Markov Modulated Characterization of Packetized Voice, Data Traffic and Related Statistical Multiplexer Performance. IEEE J. Select. Areas Commun., Vol. SAC-4, No. 6. (1986) 856-868 3. Fischer, W., Meier-Hellestern, K.: The MMPP Cookbook. Performance Evaluation. Vol.18, No. 2. (1992) 149-171 4. Gusella, R.: Characterizing the Variability of Arrival Processes with Indexes of Dispersions, IEEE J. Select. Areas Commun., Vol. SAC-9, No. 2. (1991) 203-212 5. Kang, S.H., Oh, C., Sung, D.K.: A Traffic Measurement-Based Modeling of Superposed ATM Cell Streams. IEICE Trans. Commun., Vol. E80-B, No.3, (1997) 434-441 6. Brady, P.T.: A Statistical Analysis of ON-OFF Patterns in 16 Conversations. BSTJ, Vol. 47 (1968) 73-91 7. S-Heydari, S., Le-Ngoc, T.: MMPP Modeling of Aggregated ATM Traffic. Proc. Canadian Conference on Electrical and Computer Engineering (CCECE’98), Waterloo, Canada (1998) 8. Lucantoni, D.M.: New Results on the Single Server Queue with a Batch Markovian Arrival Process. Commun. Statist.- Stochastic Models, Vol.7, No:1 (1991) 1-46

Evaluation of End-to-End QoS Mechanisms in IP Networks Fayaz A. Shaikh1 and Stan McClellan1, 2 1

Center of Telecommunications, Education, and Research, Department of Electrical and Computer Engineering, University of Alabama at Birmingham, 1150 Tenth Avenue, South, BEC 253, Birmingham, AL 35294-4461, USA [email protected] 2 IP Architecture Group, Technology & Systems Engineering, Compaq Telecommunications, 1255 West Fifteenth Street, Suite 8000, Plano, TX 75075, USA [email protected]

Abstract. The primary challenges in the deployment of Voice over Internet Protocol technology include Quality of Service (QoS) guarantees in the form of stringent bounds on end-to-end delay, jitter and loss, as well as rigorous validation of subjective and objective end-to-end quality. The performance of subjective tests to indirectly optimize transported voice quality requires test administrators to modify and compare the effect of network configurations for a large population of users. The impasse between control of network configuration and control of effective test design has prompted us to approach this joint optimization problem from the perspective of a programmable network testbed. The Video and Voice over IP Environment for Research (VVIPER) has been designed for this purpose. This paper describes design and implementation of this testbed, and presents samples of the performance results gathered for various popular IP-based QoS technologies.

Introduction Voice over IP (VoIP) is one of the fastest growing technologies in the world today, and has tremendous potential for future deployment. The success or failure of VoIP deployments depend, in large measure, on the performance of the network elements that carry and route the real-time packets as well as the digital signal processing (DSP) techniques that are used in voice codecs. Additionally, there are many technical challenges that need to be overcome before deployment of converged networks is widespread. These challenges include guarantees in the form of stringent bounds on end-to-end packet delay, jitter and loss, and statistically rigorous measurements of subjective and objective end-to-end multimedia quality. The measurement and validation of these network parameters is very difficult, particularly when phrased in the context of a highly subjective and variable phenomenon such as voice quality. Experienced network designers who have little experience in subjective testing methodologies and the particular nuances of voice quality tests tend to guide most of the technical implementations of VoIP technology. As a result, VoIP networks may be optimized according to ineffective parameters, or implementations may be grossly over-engineered in an attempt to ensure sufficient P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 579–589, 2001 © Springer-Verlag Berlin Heidelberg 2001

580

F.A. Shaikh and S. McClellan

resources for multi-service real-time traffic. Unfortunately, many of the popular remedies for packet-based network issues simply aren’t directly applicable to voicegrade transport. A different, more abstract or indirect form of “network optimization” is required in many of these cases. A particularly troublesome dichotomy involved in optimizing voice transport is the apparent need for “third party control” of some intimate aspects of network configuration. This is particularly true in case of different per-hop behaviors (PHBs). To enable particular PHBs, the network administrator must perform a series of lowlevel configurations on IP routers and other network elements. Aside from being a fairly complex and high-security working environment, the potential is extremely high for slight misconfigurations to cause serious network outages or performance degradations. Unfortunately, in most cases, these configuration parameters are precisely the source of trouble in the end-to-end QoS of converged networks. The use of subjective tests to indirectly optimize voice transport quality is an approach that may have substantial utility. However, the test administrator must be able to access, modify, and compare the effect of specific network parameters on endto-end subjective voice quality for a large population of users. Additionally, the correlation between subjective results and objective measurements can yield significant insights into network performance. The impasse between control of network configuration and control of effective test design has prompted us to approach the problem of network performance optimization from the perspective of a programmable network testbed. In the programmable network testbed, the designer/administrator of subjectively oriented tests must be able to invoke particular network configurations across a wide variety of network elements. To maintain precise, yet high-level control of the testing environment, many fundamental functions of network administration must be outsourced to the test designer. To be effective, this outsourcing of network parameters requires an easily configurable test environment, which is capable of controlling complex, heterogeneous network architectures from a very abstract perspective.

Environment Design Conceptually, such a system requires the integration of subjective testing of voice quality and well-defined configuration of network parameters with support for sufficient objective measurements. Thus, the system must automate all activities involved in network configuration to enable the collection of subjective data from users as well as objective data from measurement equipment. All aspects of network configuration are essential parts of such an environment, including periodic variation in network parameters, call generation, and data collection, as well as a capacity for remote administration of the test environment. The abstraction of such an environment is shown in Figure 1. The suggested environment provides a platform where various network scenarios can be deployed in a controlled fashion so that appropriate information regarding voice quality can be obtained. In this system, a network scenario corresponds to a particular QoS technology to be deployed in an IP-based network. Fundamental to the design of the system is the ability to collect large samples of data regarding transmitted voice

Evaluation of End-to-End QoS Mechanisms in IP Networks

581

quality using a web-based interface, and to have this corpus of data be associated with the network configuration under which it was collected. The subjective data, which is provided by untrained participants, is recorded in terms of perceived voice quality. The objective data, which is collected from various measurement equipment, is recorded in terms of packet loss, delay, or other metrics. To create a more realistic multi-service environment, high-rate streaming video can also be injected into the network. In this fashion, QoS technologies can be analyzed for effectiveness in the simultaneous transport of several kinds of real-time traffic. Objective and subjective data collected by the system can be analyzed to determine several facets of the correlation between network QoS configuration and end-to-end quality.

Fig. 1. Abstract Design

Web-based control over the sophisticated QoS parameters in various networking equipment is necessary for the system to provide synchronization, automation and controlled state transition during tests. A web-based call generation facility provides the additional required automation for the test participant, eliminating unnecessary human involvement in the test taking process. To simplify the construction of subjective tests, administrators can select between several configurations of network parameters, as well as separately generated non-speech “noise” which congests the transport path. This “noise” is used to challenge the techniques used in popular standardized QoS technologies as well as those specified by particular vendors. During an iteration of a “test,” participants are asked to rate the quality of voice for randomly selected audio clips, which are transmitted in real-time through several different, automatically configured network scenarios. These subjective rankings and objective measurements are collected, categorized by the network configuration under which they were collected, sorted according to the user who produced the data, and stored for later use in comparing the relative, overall subjective performance of the various network parameters. The Voice over IP Environment for Research (VIPER) was designed according to these requirements and specifications [1]. Initial design of VIPER did not include the video traffic and objective data collection features. Video and Voice over IP Environment for Research (VVIPER), a more robust and full-

582

F.A. Shaikh and S. McClellan

featured version of the older VIPER system has been implemented. This paper presents the features and implementation of the VVIPER system along with preliminary results and conclusions. The approach taken by VIPER and VVIPER is significant, because commercial implementations and configurations of various QoS technologies target the optimization of various network parameters. However, the relationship between perceived quality and “optimal” network parameters has not been approached from an integrated and automatic perspective.

QoS Mechanisms The network QoS parameters related to the flow of multimedia traffic are bandwidth, delay, jitter and packet loss. Standardized approaches for IP-based QoS technologies fall into the categories of prioritization (Differentiated Services, or DiffServ) and reservation (Integrated Services, or IntServ). DiffServ classifies per-hop behaviors on the basis of a DiffServ Code Point (DSCP) [2] attached to the Type of Service (TOS) byte in each packet’s IP header. This approach is a form of “soft” QoS, and is a rather coarse way of classifying services through packet marking. Depending on the actual queuing/forwarding implementation, the Expedited Forwarding (EF) class, typically DSCP value of 46, minimizes delay & jitter and provides the highest level of aggregate QoS. The effectiveness of transport for EF-marked packets is heavily dependent on the per-hop implementation. Another class of DiffServ called Assured Forwarding (AF), allows the administrator to assign the pre-set drop precedence to different traffic. IntServ on the other hand, emulating the resource allocation concept of circuit switching, apportions resources according to requests made by each application. Table 1 lists the QoS mechanisms whose behaviors have been tested using the VVIPER system, and following sections present brief descriptions of each technology. Table 1. Different QoS technologies tested in VVIPER

• • • • • • •

Queuing FIFO (Best Effort) PQ CQ WFQ WFQ with RTP priority CBWFQ LLQ with CBWFQ

• • • •

Other RSVP (only) RTP Priority (only) RSVP with RTP Priority CAR

Queuing Strategies Different queuing strategies determine the scope of congestion management. These strategies handle the incoming traffic in a particular manner by sorting and then prioritizing it into an output link. The following queuing strategies are supported by

Evaluation of End-to-End QoS Mechanisms in IP Networks

583

Cisco Systems, Inc. Internetworking Operating System (IOS), and have been used in our test cases: First In First Out (FIFO). Simply forwards the packets in the order of arrival. Priority Queuing (PQ). Allows prioritization on some defined criteria, called policy. Four queues (high, medium, normal and low) are filled with arriving packets according to the policies defined. DSCP packets marking can be used to prioritize such traffic. Custom Queuing (CQ). This allows allocating a specific amount of a queue to each class while leaving the rest of the queue to be filled in round-robin fashion. It essentially provides a way to allocate multiple classes priority in queuing. Weighted Fair Queuing (WFQ). A proprietary queuing strategy developed by Cisco. WFQ schedules interactive traffic to the front of the queue to reduce response time, and fairly shares the remaining bandwidth among high-bandwidth flows. Class Based Weighted Fair Queuing (CBWFQ). Combining custom and weighted fair queuing, class-based WFQ gives higher weight to higher priority traffic defined in classes using WFQ processing. Low Latency Queuing (LLQ). This feature brings strict priority queuing to CBWFQ. LLQ gives delay-sensitive data, such as voice, preferential treatment over other traffic. Using LLQ, delay-sensitive packets are forwarded prior to the packets in other queues. Reservation, Allocation, and Policing Strategies Reservation, allocation, and policing strategies determine the commitment of network resources. These strategies handle the incoming traffic by signaling reservation requests, allocating bandwidth, and classifying streams. The following strategies are used in our test cases: Resource Reservation Protocol (RSVP). RSVP is a signaling protocol that provides reservation setup and control to enable resource reservation prescribed by IntServ. Hosts and routers use RSVP to deliver QoS requests to the routers along the paths of the data stream and to maintain router and host state to provide the requested service, usually bandwidth and latency. Real Time Protocol priority (RTP priority). This is another way of prioritizing voice traffic. Voice packets usually use User Datagram Protocol (UDP) with RTP headers. RTP priority takes a range of UDP ports and treats them with strict priority.

584

F.A. Shaikh and S. McClellan

Committed Access Rate (CAR). Committed Access Rate (CAR) is traffic policing mechanism which provides the means to allocate bandwidth commitments and limitations to traffic sources and destinations while specifying policies for handling traffic that exceeds the bandwidth allocation. CAR policies may be utilized at either the ingress or egress of the network. CAR thresholds may be applied by access port, IP address or by application flow.

Environment Architecture Figure 2 shows the network testbed set up in the CTER laboratory [3]. The main purpose of this network testbed is to provide a realistic simulation environment of an actual network which can be used as a basis for various test scenarios. This network is comprised of several pieces of state-of-the-art networking equipment, including Cisco 7200VXR routers at the core, and Cisco 3640 VoIP gateways at the edges. For core routing, we use the Interior Gateway Routing Protocol (IGRP). The edge-based VoIP gateways use the H.323 protocol for voice call signaling. For encoding and decoding of the real-time video traffic, VBrick MPEG-1 codecs are used.

Fig. 2. Network testbed for VVIPER

Congestion and Control An important part of the architecture is that the control subnet is separated from other network connections. This configuration allows the “control” traffic that we use to dynamically reconfigure the network to be isolated from the primary network connection which carries bearer (voice, video & signaling) traffic. For the results

Evaluation of End-to-End QoS Mechanisms in IP Networks

585

presented here, the core routers are connected via a T1 “trunk” with Frame Relay encapsulation. At the edge of the network, each of the Cisco 3640 VoIP gateways has a port that is directly connected to a Plain Old Telephone System (POTS) telephone handset or modem. Since congestion is a common (and significant) problem in IP networks, we use a configurable noise-generating tool to create “noise” which congests the common T1 trunk completely. All voice, video and noise traffic passes through the same T1 trunk link. Using QoS mechanisms implemented in the core routers, the multimedia traffic is prioritized or resources are reserved even though the link is completely congested. Proxy Agents There are six main functional components of the VVIPER system. Each component represents a proxy agent integrated into the system, except the web interface. Figure 3 shows the system components of the VVIPER software along with process sequence. In the figure, “user” represents the test. As part of the test process, the user enters session information, clicks on a dial link, listens to the phone, and submits an opinion regarding perceived voice quality. No other processes are apparent to the user. Each component in Figure 3 is explained briefly below.

Fig. 3. Process sequence diagram Web Interface. As shown in Figure 3, the system is controlled and integrated by the web interface, which executes each process in a controlled fashion. Using various web technologies, the system becomes remotely accessible and administrable in addition to being platform-independent on the client end. The web interface generates messages according to the sequence shown in Figure 3. Due to the fact that major functionalities are associated with the user interface, it must be actively dynamic. As a result, the VVIPER Web Interface component is implemented using PHP 4.0.

586

F.A. Shaikh and S. McClellan

Script Loader. As soon as a participant starts a test, the Script Loader agent fetches a configuration from the script data store and executes it. Each script in a configuration scenario corresponds to a particular QoS mechanism, and is used to configure the core routers accordingly. These scripts are written using Expect 5.3.2, a command line scripting language. Noise Generator. Noise, or congestion traffic, is generated using the Iperf 1.1.1 software tool. This tool is designed to generate the required traffic, which is then analyzed for measuring bandwidth and response time between two nodes. VVIPER uses two nodes as the noise generator and the noise receiver. UDP datagrams of equal size and equal interval are sent from the generator to the receiver to fill the trunk channel close to its physical capacity. As a result, voice and video traffic generated through calls between VoIP gateways and video codecs respectively, are challenged against the QoS mechanisms used by the routers. Call Generator. The Call Generator agent is responsible for generating the telephone call to the user and playing a pre-recorded speech sample randomly chosen from the stored speech corpus. Call forwarding and routing is performed through the H.323 protocol used by the Cisco voice gateways. Vgetty - a Linux based tool - is used to generate the calls and pump the voice files into the channel. During a test, the user simply needs to click a hyperlink. In response, this agent of the system automatically generates the appropriate actions to connect a VoIP call through the voice gateways. Video Agent. In contrast with the original VIPER voice-only testbed, the VVIPER system also includes real-time video traffic. The video MPEG-1 encoder compress the real-time video traffic coming from the attached camera, then transmits it to the same link where voice and noise traffic is routed. On the other end of the network, this traffic is received by an MPEG-1 decoder which, after decompressing the data, displays it on a video monitor. In the tests described here, video traffic has been given a lower priority than voice. The Video Agent performs the appropriate actions of starting or stopping transmission of the video stream according to the messages generated by the Web Interface. Data Collector. To collect users’ opinions and objective data, MySQL is used as the VVIPER database server. Each user is prompted to submit a subjective opinion regarding perceived voice quality for each network scenario. Additionally, counters which read the packets transmitted and received on each side of the network are observed for each test iteration. These data items are collected into the database, categorized by test setup and participant information, and available for remote access and administration by a test administrator.

Test Results There are two sets of results collected from this environment. The first set of results is collected from earlier version of the system named VIPER, and is presented in [1].

Evaluation of End-to-End QoS Mechanisms in IP Networks

587

The second set of results shown in Tables 2 & 3 are collected from VVIPER. The “ranking” approach used in [1] is related to the well-known Mean Opinion Score (MOS), but it has some significant differences. Since the VIPER testing attempts to obtain a relative ranking between specific network QoS mechanisms rather than an absolute rating of quality, we slightly redefine some components of the MOS approach. This results in the “pseudo” mean opinion score (pMOS). While the pMOS scores loosely represent an MOS measure of “quality”, they are not directly comparable to MOS measurements obtained under other circumstances. From a comparison of the tabulated pMOS scores, the effectiveness of particular QoS techniques in a completely congested network can easily be observed. Since different QoS techniques incorporate different policies for routing and packet forwarding, the end-to-end nature of the pMOS scores tends to magnify those factors, which are most effective in preserving “high quality” voice transport via a congested network environment. Tables 2 & 3 show results collected using VVIPER. This data consists of objective and subjective results for voice, and objective results for video. The major difference between the VVIPER results in the tables and the VIPER results in [1] is the sample size. The VIPER results presented in [1] were collected with a significantly higher numbers of users than the VVIPER results in Tables 2 & 3. According to the objective behavior of each QoS mechanism, the technologies can be divided into two categories. Table 2 shows the QoS mechanisms for which H.245 signaling call control could not establish a logical channel [4], resulting in failure of voice packet transmission. Therefore, the packet loss data for voice traffic (marked with EF) for this group of QoS technologies could not be collected. However, the average packet drops of video packets (marked with AF43) are presented in the table. This table presents the comparative performance of each QoS for video traffic transport in a congested link. Table 2. Video packet drop in QoS using VVIPER (voice call signaling failure).

QoS Mechanism Best Effort only RSVP only CQ PQ IPRTP

Average Video Packets Dropped (%) 72.95 56.15 16.26 0.36 73.29

Due to the failure of voice signaling in these scenarios, video packets have been treated with either highest priority or best effort service. For example, in the case of RSVP only, significant bandwidth was reserved for voice, whereas no reservation was made for video packets. As a result, the video has been treated as noise, resulting in higher average packet drop. In the case of IPRTP priority, the voice packets were the only packets treated with forwarding priority; therefore, video packets were transported with best effort forwarding. Note the similarity in drop percentage between these cases. In the case of PQ, the video packets are assigned to the second highest queue, which gets highest priority in this case since there are no voice packets. As a result, the average video packet drop is negligible. In the case of CQ,

588

F.A. Shaikh and S. McClellan

the voice is assigned the highest number of byte-counts, which means that the maximum number of voice packets will be de-queued before the next class of traffic (video) will be served. Due to the fact that video packets were assigned less bytecounts than voice, the results show that average video packet drop is slightly higher than it should have been in the case of no voice traffic. In contrast, Table 3 shows another group of QoS technologies where voice signaling packets were successfully transported, the H.245 channel was established, and transmission of voice packets ensued. Shown in Table 3 are the pMOS ratings and average packet drops of voice and video traffic collected with VVIPER. These results were collected from a different population of users than the population that produced VIPER results in [1]. The QoS mechanisms presented in Table 3 are further divided into two groups. One group consists of mechanisms which produced subjective ratings consistent with those presented in [1], and the second group have subjective ratings which differ from previous results. We discuss these results separately. Table 3. Subjective and Objective results using VVIPER (voice call signaling success).

QoS Mechanism WFQ CBWFQ RSVP + IPRTP IPRTP + WFQ CAR CBWFQ + LLQ

pMOS (95% Conf. Interval) 3.5 ± 0.30 4.0 ± 0.24 1.4 ± 0.43 2.0 ± 0.24 3.3 ± 0.28 3.8 ± 0.22

Average Voice Packet Drop (%) 0.00 0.00 13.66 56.37 1.20 0.00

Average Video Packet Drop (%) 27.79 14.17 50.49 28.58 28.65 23.62

In case of the WFQ, where packets containing interactive data are kept in front of the queue to be forwarded first, subjective quality is similar to results in [1]. Voice packets are not dropped in this case. This result shows that dropped packets are not the only factor affecting perceived voice quality. Video packets are dropped with relatively higher precedence than voice packets. In the case of CBWFQ, the situation remains similar except that CBWFQ performs relatively better objectively as well as subjectively for both voice and video. This is due to the fact that CBWFQ uses WFQ mechanisms within each class whose weight and specifications are defined by the test administrator. The combined IPRTP and RSVP mechanism maintains a similar subjective rating regardless of the population of users. It improves the treatment of voice packets without significantly improving the subjective rating. This QoS approach (due to the limitation of the implementation) does not treat video preferably; therefore, video packet loss is significantly high on average. From Table 3, and in comparison with [1], we can see that the relative benefit of the combined IPRTP and WFQ approach is subjectively worse with this sample of users. This reduced rating is also directly reflected in the objective data of Table 3. This can be explained by considering the fact that WFQ does not recognize the DiffServ packet markings, and so eventually mixes up the real-time voice and video traffic. As a result, the presence of video seems to affect voice quality negatively.

Evaluation of End-to-End QoS Mechanisms in IP Networks

589

With respect to the previous collection of VIPER test data in [1], the VVIPER subjective results of CAR and CBWFQ+LLQ listed in Table 3 have improved with the addition of video traffic and the new collection of test participants. However, from the objective results, the voice packet drop rate is clearly very low, while there is significant video packet drop. This shows that these QoS mechanisms are predictable, and are producing consistent qualitative and quantitative performance.

Conclusions The VVIPER system explained in this paper was used to evaluate various QoS mechanisms for end-to-end transport of real-time, multimedia traffic in the presence of significant congestion. The subjective and objective results presented here indicate that joint optimization of network characteristics in the presence of general application-level traffic is an extremely complex issue. Queuing strategies, call admission controls, congestion avoidance mechanisms, and traffic shaping & policing technologies must each be optimized for adequate QoS. This is true especially when these technologies are deployed in a distributed system, where highly inter-related components can seriously affect overall performance. Different QoS technologies each addressing different aspects of end-to-end performance and each implemented in particular ways by equipment vendors - need to be evaluated simultaneously to achieve adequate QoS for VoIP deployments. The VVIPER testbed, as presented here, is an effective approach to accomplishing these goals. Acknowledgements This work was supported, in part, by Cisco Systems, Inc. and Compaq Telecommunications.

References 1. Shaikh, Fayaz A., McClellan, Stan: An Integrated Environment for Voice Quality Evaluation in IP Networks. Proceedings for Advanced Simulation Technologies Conference. Seattle (2001) 2. Nicholas, K., et al.: Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers. IETF RFC 2474 (1998) 3. Center of Telecommunications, Education and Research, University of Alabama at Birmingham st 4. Collins, Daniel: Carrier Grade Voice over IP. 1 edn. McGraw-Hill, NewYork (2001)

Web-Enabled Voice over IP Call Center An Open Source Based Implementation Stefan Kuhlins1 and Didier Gutacker2 1 University of Mannheim Department of Information Systems III D–68131 Mannheim Germany [email protected] http://www.wifo.uni-mannheim.de/˜kuhlins/ 2 OSI mbH Rudolf-Diesel-Straße 3 D–55286 W¨ orrstadt Germany [email protected] http://www.osi-online.de/

Abstract. This paper describes the concept and open source based implementation for combining Internet commerce solutions and WorldWide Web access to information (e.g., Internet and telephone banking) with a voice call button that allows immediate access to a call center agent from any PC over a single network connection via voice over IP. A special strength of this integrated solution is that it is context sensitive. Hence, it allows a kind of collaborative browsing where customer and agent work synchronously with the same document. We call this a “Web-enabled voice over IP call center.”

1

Motivation

Internet transactions cost about one-tenth as much as live telephone transactions, therefore the economic benefit of a self-service Web site is apparent. Unfortunately, self-service is not satisfying to all customers; there will always be those who prefer to speak with natural persons such as call center agents. Imagine the following scenario: a bank customer uses Internet banking and looks for offers on his bank’s Web site. He finds a very interesting offer, but now he needs further information. In order to get answers to his questions as soon as possible he makes a call to his bank’s call center. There he must authenticate himself again and it is necessary to tell the call center agent about the offer in question. In view of this scenario, the main benefit of a Web-enabled VoIP call center is that a customer only needs to click a button instead of making an ordinary call to his bank’s call center. After clicking the button, a connection to the call center is established using voice over Internet protocol (VoIP). At the same time, the P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 590–598, 2001. c Springer-Verlag Berlin Heidelberg 2001 

Web-Enabled Voice over IP Call Center

591

customer’s data is extracted from a database on the server and the Web page loaded by the customer is determined. This information is automatically presented on the call center agent’s terminal to help the agent assist the customer. Thus, questions can be answered quickly. As a consequence, customer and agent spend less time on things having nothing to do with bank services. Moreover, transactions may be done, which are not intended for the Web. The most important benefits of a Web-enabled VoIP call center are: – Customers get context sensitive support, e.g., for filling out forms or searching for specific content. – Customers are not forced to repeat input, which they have already made in the Web, because it is automatically provided to the call center agent. – Usually, calls by VoIP reduce telephone costs compared to phone calls via the public switched telephone network (PSTN). That applies not only to customers, but also to the call center, because it saves long distance toll charges that are incurred with an 800 number [3]. Plus, there are no charges for hold time on the Internet. – The combination of passive and active channels improves the quality of information altogether. – If customers own only one line for surfing the Internet and making calls, they may do both at the same time by using VoIP. Therefore, VoIP removes the need for customers to disconnect their Internet connection to make a call [4]. The remainder of this paper is organized as follows: In Section 2 we specify the components of our solution. Section 3 details the implementation. Next, Section 4 gives directions for future work. In Section 5 we describe some limitations of VoIP in general. Finally, Section 6 concludes the paper with a summary.

2

Components

On principle, the required techniques for surfing and Internet telephony exist. Just an appropriate combination and integration is necessary to realize a Webenabled VoIP call center. The main goal of our project is to build a Web-enabled VoIP call center based on freely available software, preferably open source software. Such a solution should be suitable for small and mid-range companies, which are not able (or unwilling) to spend much money on a sophisticated system by one of the major players in the VoIP market. On server’s side, the following components are used (see Fig. 1): – Apache Web server [1] for handling HTTP requests (Hypertext Transfer Protocol [19]) – Tomcat [2] for handling JavaServer Pages [17] – Java [14] for implementing the application server – OpenH323 [10] as telephony software in the call center

592

S. Kuhlins and D. Gutacker

C u s to m e r

P S T N

In te rn e t H T T P / V o IP

P S T N / H .3 2 3 G a te w a y

R o u te r C a ll C e n te r

S e r v e r C lu s te r H T T P / J S P S e rv e r V o E -C o A p p S (R M

IP a n d m m e rc e lic a tio n e rv e r I / E J B )

D a ta b a s e

H .3 2 3 G a te k e e p e r

A g e n t A g e n t

... A g e n t S w itc h

A g e n t A g e n t

Fig. 1. Overview of a Web-enabled VoIP call center

Tomcat is the reference implementation for JSP [2]. JSP separates the user interface from content generation enabling designers to change the overall page layout without altering the underlying dynamic content [17]. The OpenH323 project aims to create an Open Source implementation of the ITU H.323 teleconferencing protocol that can be used by personal developers and commercial users without charge [10]. H.323 is a standard for real-time multimedia communications and conferencing over IP networks [5]. On customer’s side, the requirements should be as small as possible. Thus, customers only need a multimedia PC, Internet access, a Web browser, and a H.323 compliant telephony software such as OpenH323 [10] or Microsoft’s NetMeeting [7], which is already part of newer versions of Windows.

Web-Enabled Voice over IP Call Center

593

Fig. 2. HTML page with voice call button

While the communication with the customer’s side has to deal with a myriad of possible software and hardware combinations, the equipment on the call center’s side is well known. Hence, there are no obstacles to an installation of a comfortable environment. In addition to the requirements to the customer’s side, the agents in the call center need a Java Plug-in [15] for the Web browser or the brand-new Java Web Start architecture [18], so applets or applications with a Swing-based graphical user interface [13] can be used. A Web-enabled VoIP call center replaces a regular call center as well, which handles “normal” phone calls via the PSTN. Such calls are routed by a PSTN / H.323 gateway. A gateway translates between the traditional PSTN and packetbased data networks such as the Internet. A gatekeeper acts as the central point for all calls within its zone and provides call control services to registered endpoints. In the following, we will concentrate on VoIP calls and ignore this part concerning the PSTN.

3

Implementation

The primary purpose of our prototype is to illustrate the core technological concepts. In the following, we describe a typical scenario and the implementation techniques used behind the scenes. First of all, a customer visits the Web site by loading on of its pages with a Web browser. What he sees is an HTML page (see Fig. 2), but in fact, the Web server generated this page based on a JavaServer Page (JSP). This page

594

S. Kuhlins and D. Gutacker

Fig. 3. Call center agent’s login screen with applet

includes a JavaBean that tracks the session and customer related data. Since HTTP is by design a stateless protocol, sessions administered by the Web server are required to relate different requests to the same customer. Besides session tracking, the JavaBean records every URL (uniform resource locator) that the customer visits. Moreover, it stores the customer’s IP address, which is part of every HTTP request. A connection via VoIP should be established as comfortable as possible. Therefore, a voice call button is placed on every page. If the customer pushes the button, a VoIP connection between the call center and the customer has to be established. This is realized by a link to a special JSP, which includes the aforementioned JavaBean. The JavaBean connects via Java’s Remote Method Invocation (RMI [16]) to a central server object. The server communicates with a Java applet that is part of an HTML page, which is loaded by all call center agents, because it is the login for agents (see Fig. 3). With the help of JSObject [9], a Java wrapper around a JavaScript object [8], the applet is in a position to control the call center agent’s browser. This is used to open a simple dialog box that asks a selected agent, if he accepts the voice call request. In case he does, the applet starts the telephony software with the customer’s IP address through a system call, which is checked by the security manager. On the other side, the customer’s telephony software has to be started unless already running. The easiest way to do this is to start it manually by the user before the voice call button is pushed. Automatic activation can be realized using a signed Java applet that starts the telephony software through a system call similar to the agent’s side. Another solution, which only works with Microsoft’s Internet Explorer in cooperation with NetMeeting, is the callto protocol [6]. This allows links to start NetMeeting automatically (e.g., ). Aside from its proprietary nature, the call would go from the customer to the

Web-Enabled Voice over IP Call Center

595

Fig. 4. Java application with customer data

call center, but we need it the other way round to avoid service malfunction and security problems. Hence, it is of no help in here, but nevertheless it is a nice feature. If everything is fine so far, the customer is able to accept the call back of the agent and the telephony connection is established. In case no agent is available, this information is sent to the customer as an HTML page. The customer can retry later and “surf” the Internet in the meantime. In parallel to set up the voice call connection, the server presents the customer’s data to the agent (see Fig. 4). For that purpose, a Java application is started after login. If the customer has registered himself to the system his name is known. The customer’s data includes visited URLs and the page that the customer is currently viewing (see Fig. 2). The voice call button of this page was pushed. This page is also the starting point for collaborative browsing. The agent

596

S. Kuhlins and D. Gutacker

sees it in a separate browser window (similar to Fig. 2), which was automatically opened by the Java application. If the customer clicks on a hyperlink, a request for the underlying page is sent to the Web server. As a result of this, the aforementioned JavaBean comes into play again. It informs the RMI server about the new URL. The RMI server sends the call center agent’s applet the new URL, and the applet causes the browser to load this page via JavaScript. Now, customer and agent are both looking at the new page.

4

Future Work

The goal of the first prototype is to provide clearer insights regarding the nature of VoIP and collaborative browsing. Hence, our initial “proof of concept” prototype works, but it is only a first step. There are many ways to improve the implementation. If no agent accepts the call immediately, dynamic queue statistics such as position in queue and expected wait time should be provided. For the present, the prototype supports only collaborative browsing in direction from the customer to the agent. The opposite direction can be implemented with similar techniques. It should be possible that the agent fills in forms on behalf of the customer. In support of a better scalability, an Enterprise Java Beans Server [12] should replace the RMI server. In result of this replacement, another weak point of the current prototype—the issue of persistence—would be eliminated; the central RMI server holds all data in memory, instead of using a database. If an online shop uses the system, the customer’s data presented to the agent should include the items of the “shopping cart.” In this way, the agent can propose articles for cross selling. On the customer’s side, a seamless integration of telephony software into operating systems and browsers is desirable. In this case, customers are not forced to download and install telephony software themselves. Moreover, the telephony software should start automatically, similar to Microsoft’s aforementioned callto protocol. Provided that fast communications technologies will allow the addition of video to the connections, H.323 based video between agent and customer could be added.

5

Limitations

In the early days of IP telephony, most systems were half duplex, and all were incompatible with one another, let alone with conventional telephone systems. In the meantime, things have changed, but only when VoIP provides a level of quality that nearly equals the PSTN people will accept it. At present, some restrictions on the customer’s side concerning the technical equipment have to be considered, but in the near future, this should be no more

Web-Enabled Voice over IP Call Center

597

obstacle. To achieve a suitable quality of service, customers must have an Internet connection with sufficient bandwidth. At least an ISDN line should be available. Additional equipment like a sound card, headset or speaker and microphone is needed. Today, especially headsets are not widely used.

6

Summary

Access to call center facilities via the Internet is a valuable adjunct to electronic commerce applications. Internet call center access enables a customer who has questions about a product being offered over the Internet to access customer service agents online. This combination of VoIP with point-of-service applications shows great promise for the longer term [11]. Our practical tests have shown that, apart from some minor restrictions concerning the comfort, solutions for making automated calls via VoIP and collaborative browsing are possible. Our implementation is only a first step towards a “Web-enabled voice over IP call center.” More work has to be done for a portable solution with maximum comfort and speech quality.

References 1. Apache Software Foundation: Apache Web Server, http://httpd.apache.org/ 2. Apache Software Foundation: The Jakarta Project – Tomcat, http://jakarta.apache.org/tomcat/index.html 3. Dialogic Corporation: IP Telephony in the Call Center, 1999, ftp://ftp.dialogic.com/www/pdf/5007.pdf 4. Genesys Telecommunications Laboratories, Inc.: Customer Service On The Internet – Redefining the Call Center, 1998, http://www.telemkt.com/whitepapers/ genesys-redefining.html 5. International Telecommunication Union (ITU): Recommendation H.323, PacketBased Multimedia Communications Systems, http://www.itu.int/itudoc/ itu-t/rec/h/h323.html 6. Microsoft Corporation: CallTo URL Syntax, December 05, 2000, http://msdn.microsoft.com/library/psdk/netmeet/nm3 1l4o.htm 7. Microsoft Corporation: NetMeeting, http://www.microsoft.com/windows/ netmeeting/ 8. Mozilla Organization: JavaScript, http://www.mozilla.org/js/ 9. Netscape Communications Corporation: Class netscape.javascript.JSObject, http://home.netscape.com/eng/mozilla/3.0/handbook/plugins/doc/ netscape .javascript.JSObject.html 10. OpenH323 Project: http://www.openh323.org/ 11. Ryan, J.: Voice over IP, The Technology Guide Series techguide.com, 1998, http://www.techguide.com/comm/voiceip.shtml 12. Sun Microsystems, Inc.: Enterprise JavaBeans Technology, http://java.sun.com/ products/ejb/ 13. Sun Microsystems, Inc.: Java Foundation Classes, JFC/Swing, http://java.sun.com/products/jfc/ 14. Sun Microsystems, Inc.: Java Homepage, http://java.sun.com/

598

S. Kuhlins and D. Gutacker

15. Sun Microsystems, Inc.: Java Plug-in, http://java.sun.com/products/plugin/ 16. Sun Microsystems, Inc.: Java Remote Method Invocation Specification, Java 2 SDK, version 1.3.0, December 1999, ftp://ftp.java.sun.com/docs/j2se1.3/ rmi-spec-1.3.pdf 17. Sun Microsystems, Inc.: JavaServer Pages, http://java.sun.com/products/jsp/ 18. Sun Microsystems, Inc.: Java Web Start, http://java.sun.com/products/ javawebstart/architecture.html 19. W3C: HTTP – Hypertext Transfer Protocol, March 27, 2001, http://www.w3.org/ Protocols/

ANMP: Active Network Management Platform for Telecommunications Applications Won-Kyu Hong and Mun-Jo Jung Telecommunications Network Lab., R&D Group, Korea Telecom 463-1, Junmin-dong, Yusung-gu, Taejeon, 305-390 Korea Phone: +82-42-870-8254, Fax: +82-42-870-8229 {wkhong,mjjung}@kt.co.kr

Abstract. The ability to rapidly create and deploy new services in response to the market demands will be the key factor in determining the success of future network service provider. There are several works to meet this requirement in the field of active network management [1,2,10– 15]. However the traditional active network management is essentially based on the revision of network elements, which subsequently delays the provision of new service due to the hardware revision. This paper proposes an Active Network Management Platform (ANMP) for rapid provisioning of new telecommunications network management functions as we locate most of the necessary control functions of active network management not on the network elements but on the ANMP. To do this, this paper proposes the reference model of active network management composed of three hierarchical levels: the network element level, the active network management platform level based on CORBA, and the network management level. Based on the reference model, we propose the detailed system architecture for the active network management platform and programmable APIs designed by CORBA IDL [5] for provisioning of new service, modification of existing service, withdrawal of obsolete service and authentication. Lastly, this paper verifies the performance of the proposed ANMP with the implementation using the IONA Orbix [4] through the case study of the reconfiguration of the ATM VP tunnels connecting routers.

1

Introduction

Because the active networks play a significant role in the evolution of packetswitched networks, it leads to more general functionality supporting dynamic control and modification of network behavior from traditional packet-forwarding engines. The ability to rapidly create and deploy new services in response to market demands will be the key factor in determining the success of the future network service provider. As the high-speed switching and communication infrastructure is improved and transmission speed is increased, it is anticipated that the competition for product differentiation will increasingly depend on the degree of flexibility and the speed of deployment of new services that a future P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 599–611, 2001. c Springer-Verlag Berlin Heidelberg 2001 

600

W.-K. Hong and M.-J. Jung

provider can offer. These factors in turn depend heavily on the flexibility of the software architecture of vendor-specific network elements. A number of ways to provide the customer programmable network provisioning in terms of active network are as follows: – Provisioning of software development facilities “on-board”, together with a standard API. This would add considerably to the cost of network equipment, but, conceivably, it would be possible to design the switch or router of the future with a plug-in software development module as an optional feature, in the same way that today one can get an optional redundant controller card or PSU. Equipment without such a board could upload run-time code, but could not compile or debug programs [2]. – Use of a common logical model of the hardware at a node. The Java Virtual Machine is an obvious candidate here. Java is increasingly being promoted for use in embedded systems. It is to be presumed that the real-time performance required in networking applications will be supported by Java in the near future, as compiler technology is improved, and specialized hardware is rolled out. It is imperative that the technique adopted uses portable code, since otherwise we are adding complexity where we sought to remove it [2]. However these are major barriers to provide rapid provisioning of new services. It is most reasonable and cost effective for the distributed computing approach to rapidly meet the market demands because it need not directly control the network element itself and can solve the problems caused by the centralized network management. The paper proposes the distributed active network management platform for provisioning of new service, modification of existing service, withdrawal of obsolete service and authentication using the CORBA technologies such as IIOP, Naming Service, Event Service, etc [5,6]. It provides the two major aspects of the elimination of network element revision and the utilization of the distributed nature of telecommunications network applications. To do this, this paper proposes the reference model of active network management composed of three hierarchical levels: the network element level, the active network management platform level based on CORBA, and the network management level. The programmable APIs essentially needed in active network management are provided not at the level of network element but at the level of distributed middleware, Active Network Management Platform (ANMP), taking into account the distributed nature of telecommunications network applications and the rapid deployment of new services without any modification of network elements. In this paper, we describe the programmable APIs using CORBA IDL [5,6]. In addition, this paper verifies performance of the proposed ANMP with the implementation using the IONA Orbix [4] through the case study of the reconfiguration of the ATM VP tunnels connecting routers in case of performance degradation. It also describes the scenarios for ATM VP reconfiguration under the ANMP.

Active Network Management Platform for Telecommunications Applications

601

The rest of this paper is organized as follows: in the next section, we define a reference model of active network composed of three hierarchical functional levels. In section 3, we present the system architecture for the distributed active network management model, which describes the distributed active network management system components and their relationships for active network management. In addition, the distributed programmable APIs are described. In section 4, we show the performance of the ANMP in terms of ATM VP tunnel modification and creation when there are IP level performance degradation. Finally, we summarize our study and further studies.

2

A Reference Model of Active Network Management

For the rapid provisioning of new telecommunications network management functions, we revise only the distributed computing components running over Active Network Management Platform (ANMP) instead of the revision of the network element. It takes more than six months to add new service feature into the network elements because of persuading vendors to implement new service feature and reverting to legacy protocol, etc. To provision the new telecommunications services, this paper proposes an active network management model as shown in Fig. 1.

IP Network Mgmt.

ATM Network Mgmt. Network Resource Control  Route Provisioning

IP Trunk Dimensioning  Routing Protocol Control





Telecommunications Service Component Management IDL Interface

Network Management Plane (IP and ATM Networks)

CORBA/GSMP Gateway

ANMC D

ANMC C

ANMC B

ANMC A

ANMC E

ANMC F

RMON

CORBA-based Active Network Management Platform (ANMP)

CORBA/SNMP Gateway

ANMC: Active Network Management Component (CORBA) Router

ATM Switches

Router

Fig. 1. Reference model for active network management

602

W.-K. Hong and M.-J. Jung

It consists of three hierarchical levels: the network element composed of ATM switches and routers, the active network management platform based on CORBA, and the network management plane. The network element level represents the network element itself such as ATM switch, router, etc. In our reference model, the network element is not modified or customized for supporting active network management. In case of the existing active network management, most of control functions for supporting active network management are embedded in network element [1,2]. However we do not change any portion of network elements. The active network management platform represents the distributed middleware for providing the active network management functions. Most of the active network management system components including distributed programmable APIs are resided in this level. All of the system components, Active Network Management Component (ANMC), use the CORBA services such as IIOP, Naming Service (NS), Event Service (ES), etc. It also includes the COBRA/SNMP [23,24] gateway to interact with routers and CORBA/GSMP [14,15] gateway to interact with ATM switches and CORBA/RMON gateway to monitor the network status. The network management plane level represents the integrated IP/ATM network management functions. There are intrinsic management functions of IP and ATM such as IP trunk provisioning among routers, routing protocol designation, domain management, network resource control, VP dimensioning, route dimensioning, and so on. In addition to them, we newly define the telecommunications service component management functions taking the role of design and creation of new telecommunications services according to the policy of the network service provider to meet customer needs and face up with the future market demands. Our active management model aims to design the necessary active network management functions to guarantee the IP QoS over ATM at the distributed middleware not at the network element. There are client/server network relationship between IP and ATM networks to support IP QoS over ATM based on ITU-T G.805 layering concept [3]. In order to guarantee IP QoS over ATM, the major IP network management functions can be Service Level Agreement (SLA) and performance monitoring and that of ATM can be ATM VP tunnel provision connecting routers and the reconfiguration of VP tunnel in the case of performance degradation and abnormalities.

3

System Architecture for ANMP

In this section, we define the system architecture for ANMP. It is the distributed middleware located between the network management plane level and the network element level. It provides the distributed programmable APIs to the telecommunications service management component of network management plane level for provisioning, modification, authentication, and withdrawal of telecommunications services. In addition, it takes the roles of the control of network elements in line with the service provisioning logic of the distributed

Active Network Management Platform for Telecommunications Applications

603

ANMP. The ANMP uses the CORBA [5,6] as the distributed platform to deploy the active network management components in location transparency. Because CORBA gives the several transparencies of location, migration, interaction transparencies, etc., the system components composing ANMP can be dispersed into different systems. Fig. 2 shows the detail system components of the ANMP.

Telecommunication Service Component Management

Service Design

Service Authorization

Service Provisioning

Service Implementation

Application Knowledge Mediator (AKM)

Active Network Management Platform (ANMP)

Active System Authenticator (ASA)

Active System Component Launcher (ASCL)

Service Component Service Object (SCO) Component Service Object (SCO) Component

SQL / SQL*Net

Object (SCO)

Application Knowledge Base (AKB)

Active Mediator (AM)

COBRA/SNMP Gateway (CSG) SNMP

COBRA/GSMP Gateway (CGG) GSMP

COBRA/RMON Gateway (CRG) RMON RMON

Router

ATM S/W

Probe

Fig. 2. System architecture for ANMP

To provide a new telecommunications service, the network service provider does following steps at the Network Management Plane: – Service Design - At first, the network service provider designs the new service taking into account the modularity and interoperability with existing services. – Service Implementation - With the results of service design, the network service provider implements the new service using the distributed implementation technologies such as CORBA. – Service Provisioning - After implementing the new service, the network service provider uploads the implemented CORBA objects into the active network management platform via the FTP mechanism [20,21]. The uploaded CORBA objects are composed of client and server stubs and implementation body.

604

W.-K. Hong and M.-J. Jung

– Service Authorization - After unloading the new service component into the active network management platform, the network service provider registers the authentication information such as the service invocation, modification or withdrawal. The ANMP is composed of Active System Component Launcher (ASCL), Active Mediator (AM), Application Knowledge Mediator (AKM), and Service Component Object (SCO). All of the objects are distributed objects running over CORBA with the location, interaction and migration transparencies. The interfaces provided by each distributed objects composing the ANMP are shown in Fig. 3 and the object interaction flow for provisioning a new service under the ANMP is shown in Fig. 4. mo d u l e

ANMP { i nt e r f a ce Re s u l t _ t Re s u l t _ t Re s u l t _ t Re s u l t _ t }; i nt e r f a ce Re s u l t _ t

Ac t i v e Co mp o n e n t L a u n c h e r I f { p u s h Ap p ( i n Ap p Ob j e c t _ t a p p Ob j e c t , i n Ap p T y p e _ t p o p u p Ap p ( i n Ap p T y p e _ t a p p T y p e ) ; a c t i v a t e Ap p ( i n Ap p T y p e _ t a p p T y p e ) ; d e a c t i v a t e Ap p ( i n Ap p T y p e _ t a p p T y p e ) ;

a p p Ty p e ) ;

Ap p l i c a t i o n Kn o wl e d g e Me d i a t o r I f { a d d Ap p Kn o wl e d g e ( i n Ap p Kn o wl e d g e _ t a p p Kn o wl e d g e , i n Ap p Kn o wl e d g e I d _ t a p p Kn o wl e d g e I d ) ; Re s u l t _ t r e mo v e Ap p Kn o wl e d g e ( i n Ap p Kn o wl e d g e I d _ t a p p Kn o wl e d g e I d ) ; Re s u l t _ t mo d i f y Ap p Kn o wl e d g e ( i n Ap p Kn o wl e d g e _ t a p p Kn o wl e d g e , i n Ap p Kn o wl e d g e I d _ t a p p Kn o wl e d g e I d ) ; v o i d o n e wa y a c t i v a t e Ap p S e r v i c e ( i n s e r v i c e I n f o _ t s e r v i c e I n f o ) ;

} / /

}; i nt e r f a ce a c t i v e Me d i a t o r I f { Re s u l t _ t s e t E F D( i n E f d I d _ t e f dI d, i n Ac t i o n _ t a ct i on) ; Re s u l t _ t g e t E F D( i n E f d I d _ t e f dI d, o u t Ac t i o n _ t act i on) ; v o i d o n e wa y n o t i f y Al a r m( i n No t i f i c a t i o n I n f o _ t n o t i f i c a t i o n I n f o ) ; }; i nt e r f a ce a c t i v e S y s t e mAu t h e n t i c a t o r I f { Re s u l t _ t a d d Au t h o r i t y ( i n Ap p T y p e _ t a p p Ty p e , i n Au t h o r i t y _ t aut hor i t y) ; Re s u l t _ t r e mo v e Au t h o r i t y ( i n Ap p T y p e _ t a p p Ty p e , i n Au t h o r i t y _ t aut hor i t y) ; Re s u l t _ t v e r i f y Au t h o r i t y ( i n Ap p T y p e _ t a p p Ty p e , i n Au t h o r i t y _ t a ut hor i t y) ; }; e n d o f mo d u l e

Fig. 3. CORBA IDL interface for ANMP

Active System Component Launcher (ASCL) takes the key role of the distributed ANMP. It provides the pushApp() interface that allows the network operators to deploy a newly implemented Service Component Object (SCO) into the ANMP, which has the software upload functions implemented by FTP [20,21]. If the pushApp() operation is called, the Active System Component Launcher registers the provisioned Service Component Objects to CORBA Naming Service (NS) to provide the object location transparency and load balancing. It also provides the interfaces to activate and deactivate Service Component Objects such as activeateApp() and deactiveApp() as shown in Fig. 3 and 4 , respectively. After registering Service Component Objects to CORBA Naming Service (NS) in consequence of the pushApp() operation execution, the network provider calls the activateApp() operation of Active System Component

Active Network Management Platform for Telecommunications Applications addAuthority() removeAuthority()

Active System Authenticator (ASA)

pushApp() popupApp() activateApp() deactivateApp()

Active System Component Launcher (ASCL)

addAppKnowledge() removeAppKnowledge() modifyAppKnowledge()

setEFD() getEFD()

Active Mediator (AM)

verifyAuthority()

605

activateServiceApp()

Application Knowledge Mediator (AKM)

Service Component Object A

notifyAlarm()

Application Knowledge Base (AKB) CSG, CGG, CRG

IF(serviceType == SNEW) THEN IF((result = callAO(C)) == SUCCESS) IF((result = callAO(B)) == SUCCESS) IF((result = callAO(D)) == SUCCESS) IF((result = callAO(A)) == SUCCESS) success SNEW; return; ELSE fail SNEW; return; ELSE fail SNEW; return; ELSE fail SNEW; return; ELSE fail SNEW; return; ELSE invalid SNEW; return;

Service Component Object B

Service Component Object C

Service Component Object D Service Component Object (SCO) Interaction for New Service (SNEW) Provision

Fig. 4. Object interaction for new service provision

Launcher to register the necessary service provisioning scenario designated application knowledge to Application Knowledge Mediator (AKM) by calling the addAppKnowledge() operation. In addition, it provides popupApp() to network operator to remove the pre-provisioned Service Component Objects that is obsolete. If this operation is called, the Active System Component Launcher removes the named Service Component Objects from ANMP and deregisters them from CORBA NS. After removing obsolete Service Component Objects from ANMP, the network operator invokes the deactiveteApp() operation of Active System Component Launcher and the Active System Component Launcher subsequently invokes the removeAppKnowledge() operation of Application Knowledge Mediator (AKM) to remove the application knowledge corresponding to the removed Service Component Objects from the Application Knowledge Base (AKB). It provides the distributed CORBA IDL interfaces for the telecommunications application provisioning such as new service component registration, withdrawal, and service activation. In addition, it provides the CORBA IDL interface upload the implemented service components that are designed and implemented by network service provider. Active System Authenticator (ASA) maintains the authentication information provisioned at the process of service authentication of network management plane and authenticates new service provisioning, modification of existing services, and the withdrawal of old services.

606

W.-K. Hong and M.-J. Jung

Application Knowledge Mediator (AKM) manages the Service Component Objects (SCOs) invocation scenario that is stored in database for persistency. Let’s assume that there are four distributed application objects of A, B, C, and D. If one provides a new service of SNEW, the application objects of C, B, D, and A are sequentially activated. Such kinds of Service Component Object invocation rules are maintained and managed by the Application Knowledge Mediator as shown in Fig. 4. The object invocation scenario can be added, modified and removed with the addAppKnowledge(), modifyAppKnowledge() and removeAppKnowledge() operation of Application Knowledge Mediator, respectively. The object invocation scenario can be directly provisioned by the network operator or indirectly provisioned by the Active System Component Launcher (ASCL) in subsequence of Service Component Object (SCO) provisioning. Service Component Object (SCO) represents the part of newly added telecommunications services, which is also implemented CORBA object. It has the client and server stubs for supporting IIOP communications under the CORBA distributed environment. There can be several distributed CORBA objects interacting with each other to provide a new service. The decomposition granularity of application objects to provide a new service depends tightly on the network provider’s decision taking into account the object distribution overhead, reuse, etc. The provisioning of the application objects into ANMP is controlled by the pushApp() and popupApp() operations of Active System Component Launcher (ASCL). Active Mediator (AM) provides the wicket IDL interface to CORBA/SNMP Gateway (CSG), CORBA/GSMP Gateway (CGG), and CORBA/RMON Gateway (CRG). On receiving any kinds of notifications from CSG, CGG, and CRG via notifyAlarm(), the active mediatator filters the alarm according to the “event forwarding descriminator (EFD)” that is managed by the interfaces of setEFD() and getEFD(). If an alarm is critical, the active mediator requests the activation of the telecommunications applications for coping with the alarm to Application Knowledge Mediator (AKM) by invoking the interface of activateServiceApp().

4

A Case Study of ANMP

In case of IP over ATM environment, IP takes the roles of network management system function of Service Level Agreement (SLA), performance monitoring, etc. On the other hand, ATM takes the roles of the provisioning of the ATM VP PVCs for connecting routers and the reconfiguration of VP PVCs in the cases of performance degradation and abnormalities. In order to verify the proposed Active Network Management Platform (ANMP), we experimented the reconfiguration service of ATM Virtual Path (VP) tunnels connecting routers under environments as shown in Fig. 5. For the experimental network configuration, we use the four ASX-200 ATM switches [7] and three GRF1600 routers [8,9]. The Connection Admission Control Object (CACO) takes the role of connection admission control on the selected routing path with the status of network resources. The ATM Routing Table Management Service Object (AMMSO) finds

Active Network Management Platform for Telecommunications Applications (7)

(6)

607

(1)

Active Network Management Platform (ANMP) (3)

Active System Component Launcher (ASCL)

IONA Orbix Naming Service (NS)

Connection Admission Control Object

(2)

Active System Authenticator (ASA)

(13)

Register Application Objects to CORBA NS

(4)

(14) (17)

Application Knowledge Mediator (AKM)

(11)

(5) (12)

Application Knowledge Base (AKB) Oracle DB

Active Mediator (AM)

IP Network Topology Management Object

ATM Routing Table Mgmt. Service Object

(15)

(20)

(19) (16)

Connection Control Object

(8)

(17)

(10)

(10)

(10) CORBA/RMON Gateway (CRG)

CORBA/SNMP Gateway (CSG)

(9) Service Component Object EFD Control Flow Authentication Control Flow Service Component Object Provisioning Flow Active Network Management Flow

(21)

CORBA/SNMP Gateway (CSG)

(9,18)

(21)

RMON

Probe Router Agent

CORBA/GSMP Gateway (CGG)

SNMP Agent

ATM Server Network

GSMP Agent Router

Agent FORE ASX200

GRF1600 Original ATM VP Tunnel between Routers Reconfigured ATM VP Tunnel between Routers

IP Client Network

Fig. 5. ATM VP tunnelling service provisioning

the optimal route and alternative route based on the ATM network topology information. The Connection Control Object (CCO) maintains the ATM PVC information connecting routers and controls ATM switches to setup, release and modify the cross connections within ATM switches. In addition, it requests the optimal and alternative route provisioning to AMMSO in order to setup new ATM PVC or to reconfigure the existing ATM PVC suffered from congestion. The IP Network Topology Management Object (INTMO) maintains the IP network topology that is composed of routers and the IP links connecting routers. The IP links connecting routers are corresponding to the ATM VP PVC that is created by CCO. It also keeps the relationship information between IP link and ATM VP PVC, which represents the client/server relationship between IP link and ATM VP VPC. For this case study of new service provisioning according to the proposed ANMP, we deploy the three GRF1600 routers connected with 10 Mbps ATM Virtual Path Connections (PVC). We assume that the router A detects the bottleneck at the output port that terminates the 10 Mbps ATM VPC between router A and B. The scenario to provide the new ATM VP tunnelling service into ANMP is as follows: 1. The network operator designs and implements the application objects to provide ATM VP tunnelling service that is composed of four application ob-

608

2. 3. 4. 5. 6.

7. 8.

W.-K. Hong and M.-J. Jung

jects such as Connection Admission Control Object (CACO), ATM Routing Table Management Service Object (ARTSO), Connection Control Object (CCO) and IP Network Topology Management Object (INTMS). These objects are implemented as CORBA objects using the IONA Orbix3.0 [4]. The network operator complies them and generates executable codes. The network operator provisions the executable application objects to ANMP using the pushApp() operation of Active System Component Launcher (ASCL). Receiving the new application objects from network operator, Active System Component Launcher (ASCL) locates them at the predefined location, for example, “\u1\applicationobject\”. Active System Component Launcher (ASCL) registers the provisioned application objects to IONA CORBA Naming Service (NS) for object location transparency. Active System Component Launcher calls the addAppKnowledge() operation of Application Knowledge Mediator (AKM) to register the object interaction scenario. Application Knowledge Mediator stores the received object interaction scenario for supporting VP tunnelling service into the Oracle database of Knowledge Base (KB). With above five steps, the new active service for ATM VP tunnelling is provisioned into the ANMP. After finishing this, the network operator gives the authority to the provisioned application services using the interface of Active System Authenticator (ASA). After furnishing the authority on the provisioned application services, the network operator controls the Event Forwarding Discriminator (EFD) by calling the interface, setEFD(), of Active Mediator (AM). Because the EFD can be related with IP or ATM, Active Mediator (AM) controls the each Gateway according to the type of EFD. With above eight steps, the new active service for ATM tunnelling is provisioned into the distributed ANMP. After finishing the application service provisioning, the provisioning scenario of the real VP tunnelling service is as follows:

9. The RMON Probe for IP segments and the GSMP Agents for ATM switches gather performance data [19] from routers and switches. If there is any symptom of performance degradation, they notify it to their corresponding gateways. If there is any fault, they notify an alarm to their corresponding gateways. 10. Each gateways notify the performance degradation or fault to Active Mediator (AM) via the notifyAlarm() interface. 11. On receiving the alarm caused by the performance degradation or fault, Active Mediator decides whether it is needed to activate the active network management function that is composed of several Service Control Objects (SCOs) or it is not needed to activate based on the EDF information.

Active Network Management Platform for Telecommunications Applications

609

12. On receiving the service activation request due to the congestion of the VP tunnel termination point, Application Knowledge Mediator refers to the Application Knowledge Base (AKB) to determine the object interaction scenario. 13. After identifying the service interaction scenario, Application Knowledge Mediator verifies whether it has the proper authority to activate the service of VP tunnel reconfiguration referring to the authority information that is maintained by the Active System Authenticator (ASA) using the verifyAuthority() interface. 14. With the object interaction scenario getting from Application Knowledge Base (AKB), the Application Knowledge Mediator (AKM) calls the IP Network Topology Management Object (INTMO) to get the corresponding ATM VP tunnel. 15. After getting the ATM VP tunnel causing the congestion from INTMO, Application Knowledge Mediator issues the reconfiguration request of ATM VP tunnel to the Connection Control Object (CCO). 16. The CCO requests the alternative route allocation to ATM Routing Table Management Service Object (ARTMSO). 17. On receiving the request of the alternative route provisioning from CCO, ARTMSO selects the optimal alternative route and requests the CAC to the Connection Admission Control Object (CACO). Subsequently, Connection Control Object (CCO) requests the ATM VP tunnel reconfiguration to CORBA/GSMP Gateway (SGG) [16,17,18,22]. 18. On receiving the VP tunnel reconfiguration request from CCO, CSG controls ATM switches (FORE ASX-200BX) to reconfigure the ATM VP tunnel according to the found alternative routes. 19. After finishing the ATM VP tunnel reconfiguration by CCO, CCO requests the reconfiguration of the VP tunnel termination points to IP Network Topology Management Object (INTMO). 20. INTMO requests the reconfiguration of ATM VP tunnel termination points to CORBA/SNMP Gateway (CSG) [23,24]. In this case study, there are two ATM VP tunnel termination points: one is terminated at the router A and the other is terminated at the router B. 21. The CSGs managing the router A and B issues the reconfiguration request of ATM VP tunnel termination points to their corresponding router agents. With above 13 steps from 9 to 21, the ATM VP tunnel connecting router A and B is reconfigured by the interaction of the active application objects in ANMP. If one wants to reconfigure the ATM VP tunnel with another routing policies, the network provider simply changes the application objects of ATM Routing Table Management Service Object (ARTMSO). If one wants to deploy another CAC algorithm, the network operator simply replaces the Connection Admission Control Object (CACO). Thus, this distributed active network management platform gives the high flexibility for new service provisioning at the level of middleware not at the level of network element. It takes 1.45 seconds to reconfigure the congested ATM VP PVC that traverses three ATM switches.

610

5

W.-K. Hong and M.-J. Jung

Concluding Remarks

This paper proposed the Distributed Active Network Management Platform (ANMP) that can provide the customized and rapid new telecommunications services. It could provide the rapid new service provisioning without the network element revision and maximize the efficiency for the deployment of new network management applications. In order to design the efficient distributed active network management platform, this paper proposed the reference model of active network management composed of three hierarchical levels: the network element level, the active network management platform level based on CORBA, and the network management level. The programmable APIs essentially needed in active network management are provided not at the level of network element but at the level of distributed middleware of Active Network Management Platform (ANMP). In addition, this paper proposed the detailed system architecture for the active network management platform for provisioning of new service, modification of existing service, withdrawal of obsolete service and authentication. We also defined several distributed programmable APIs using CORBA IDL [5,6] for the customized and rapid provisioning of the distributed telecommunications network applications. We validated the proposed ANMP with the case study of the reconfiguration of ATM Virtual Path (VP) tunnel connecting two active nodes where there is congestion, which took 1.45 seconds to reconfigure the congested ATM VP PVC that traverses three ATM switches. With this validation, we concluded that the ANMP could be the highly applicable platform for telecommunications network management to provide the new network management functions without any modification of network elements. However, the mechanisms should be further refined to provide the programmable APIs to telecommunications service users as well as telecommunications network operators.

References 1. Kennrth L. Calvert, Samrat Bhattachharjee, Ellen Zegura, and Janmes Sterbenz: Directions in Active Networks, IEEE Communications Magazine, October 1999. 2. Martin Collier: Netlets: The Future of Networking?, First Conference on Open Architectures and Network Programming (OPENARCH), San Francisco, 3-4 April 1998. 3. ITU-T G.805: Generic Function Architecture Of Transport Networks, November 1995. 4. IONA Technologies Ltd.: Orbix Programming Guide - Release 3.2, November 1997. 5. OMG: CORBAServices: Common Object Service Specification, March 31, 1995. 6. OMG: The Common Object Request Broker: Architecture and Specification, July 1995. 7. http://www.marconi.com/products/communications/routing_switching/atm_ core/asx-200/asx-200_hp.html. 8. http://www.lucent.com/ins/products/grf/grf1600.html. 9. http://www.lucent.com/ins/products/grf/grf_a.html.

Active Network Management Platform for Telecommunications Applications

611

10. Dan S. Decasper, Bernhard Plattner, Guru M. Parukar, Sumi Choi, John D. Dehart and Tilman Wolf: A Scalable High-Performance Active Network Node, IEEE Network, January/Febuary 1999. 11. D.Scott Alexander, Willam A. Arbaugh, Angelos D. Keromytis, and Jonathan M. Smith: A Secure Active Network Environment Architecture: Realization in SwitchWare, IEEE Network, May/June 1998. 12. Maraica Calderon, Marifeli Sedano, Arturo Azcorra, and Cristian Alonso: Active Network Support for Multicast Applications, IEEE Network, May/June 1998. 13. David L. Tennenhouse, Jonathan M. Simth, W.Savid Scincoskie, David J. Wetherall, and Gary J. Minden: A Survey of Active Network Research, IEEE Communications Magazine, January 1997. 14. Danny Raz and Yuval Shavitt: Active Networks for Efficient Distributed Network Management, IEEE Communications Magazine, March 2000. 15. D.Scott Alexander, Willam A. Arbaugh, Angelos D. Keromytis, and Jonathan M. Smith: The SwitchWare Active Network Architecture, IEEE Network, May/June 1998. 16. Balaji Srinivasan: Definitions of Managed Objects for the General Switch Management Protocol (GSMP), draft-ietf-sgmp-mib-02.txt, June 2000. 17. Tom Worster: General Switch Management Protocol V3, draft-ietf-gsmp-06.txt, January 2001. 18. Avri Doria: GSMP Packet Encapsulations for ATM, Ethernet and TCP, draft-ietfgsmp-encaps-02.txt, July 2000. 19. Adny Bierman: Performance Measurement Capabilities MIB, draft-ietf-rmonmibpmcaps-01.txt, 14 July 2000. 20. IETF RFC 2389: Future Negotiation Mechanism for the File Transfer Protocol, August 1999. 21. IETF RFC 2640: Internationalization of the File Transfer Protocol, July 1999. 22. IETF RFC 2515: Definitions of Managed Objects for ATM Management, February 1999. 23. IETF RFC 2571: An Architecture for Describing SNMP Management Frameworks, May 1999. 24. R. Presuhen: Management Information Base for the Simple Network Management Protocol, draft-ietf-snmpv3-update-mib-v5.txt, 9 August 2000.

An Active Network Architecture: Distributed Computer or Transport Medium Eva Hladk´ a and Zdenˇek Salvet 1

Faculty of Informatics [email protected] 2 Institute of Computer Science, Masaryk University, 602 00 Brno, and also CESNET, z.s.p.o., Prague Czech Republic [email protected]

Abstract. Future computer networks must be more flexible and faster then today. Active network paradigm is the way how to add flexibility to networks. During the last five years, several active network architecture models were presented. A new one, based on model of active nodes is presented here. The key features of this architecture are the separation of session or connection management functions from the bulk data packet processing functions and associated session management protocol that facilitates user control over active network processing. This architecture is designed to be sufficiently general to accommodate and build on top of any packet-based networking technology. The description of the model is followed by brief of prototype implementation using PC-class computers with NetBSD operating system.

1

Introduction

Introduction of new innovative Internet applications sometimes demands special network services which are very difficult or impossible to provide in efficient manner using contemporary standard networks behaving as a passive transport medium. Some of such new complex services may be naturally supported by adding various levels of user programmability to the routing elements inside the network (routers, switches, optical cross-connect systems, etc.). In the last few years, several of such programmable network architectures are being developed, commonly called “active networks”. Active networks were introduced in order to provide more flexibility within the network itself — network with active routing and switching elements can be seen as a special type of distributed computing facility [1], [2]. Like other types of distributed computing facilities (or even more so), this may pose a lot of problems to solve, depending on type of services supplied to (end-)user. These problems range from need of high-level authentication, authorization, and accounting schemes and policies usable with multiple administrative domains through task scheduling and resource allocation, reservation, and management P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 612–619, 2001. c Springer-Verlag Berlin Heidelberg 2001 

An Active Network Architecture: Distributed Computer or Transport Medium

613

to lower-level performance, scalability, and device management issues. Also, in some cases confidentiality, non-repudiability or other special security services may be required. While not all these concerns are applicable to all active network architectures and service levels that may be supported, it is important to make sure they have been addressed before real-world deployment of active network. Active networks provide excellent development environment for new network protocols. Our interest in active networks stems from this ability, combined with the interest in the real time transmissions of the audio and video streams and the associated requirements for quality of service (QoS). We find currently available technologies insufficient for use in situations where more sophisticated QoS management is needed. In typical IP networks, best-effort approach is used, and even best available implementations of RSVP and ATM protocols are limited to raw bandwidth and transmission delay management only. There is no support for more structure- or content-oriented features like, for example, multi-priority packet drop and hierarchical data streams. (Moreover, ATM is still and may remain too expensive for connecting ordinary end-user machines.) We try to construct AN architecture, which will help us not only to develop new network protocols tailored to new applications, but also gives us possibility to implement new QoS capabilities. We have developed an active network architecture using the concept of active nodes and we are working on the implementation of this architecture using software routers based on the NetBSD (UNIX) open-source operating system. The main features of our active network model and its (prototype) implementation are influenced by the desire for support of novel QoS-oriented features that we plan to implement using the new active network model and its first implementation.

2

The New Active Network Model

The proposed active network architecture uses “active node” approach to active networking and concept of “sessions” similar to connections in connectionoriented networks or sessions in RSVP protocol. Structure of an active node (router) plays a key role in our model. It is a network element which is able to accept user-supplied programs and to execute them. The processing of user code consists of two separate (communicating) processes. The first one controls the session establishment and management. It has the role of control plane in active router processing and includes (initial or later) load of user functions onto the routers along the path between source and destination address or addresses and execution of bookkeeping functions. The second part of user code, initiated by the first one, forms the central part of the data packet processing itself. An active session consists of state information in active routers that controls handling of traffic among communicating endpoints. The most important part of an active session is the set of running instances of user code session programs. They manage other parts of state, i.e. spawning per-packet processing code, set-

614

E. Hladk´ a and Z. Salvet

ting input packet filters and classifiers and configuration of output queues, using the active node programming interface (API). The session itself can be controlled (created, spread to new active nodes, modified by setting various parameters, partially or fully destroyed) in response to user requests but also from the inside — by session programs. An active session can be managed either remotely using session management protocol or locally using management API of active node management software. In the typical scenario, user application communicates with first-hop active router using the session management protocol and starts the first instance of appropriate session program with desired parameters. The session program then computes some additional (next-hop) active nodes that should take part in active processing, starts new instances of session program on them and programs per-packet processing functions. The whole process repeats with any new active nodes used. If any failure occurs during session setup, crankback technique can be used to find alternative paths in network. The location of first-hop active router (set of routers) may be either included in the end user configuration data (manual configuration, DHCP data, etc.) or determined by lower-layer specific active router discovery protocol. The software running on the active node consists of four sets of programs: – session programs that are supposed to take care of establishing connections to other active nodes, computing routing information, negotiation of QoS parameters and other functions related to user-defined session management. They are supplied by user or other active node during session establishment along with parameters and can be stopped or changed later during session lifetime. – programs performing per-packet processing (forwarding, replication, policing, packet scheduling, etc.). These are supplied by user or other active node during session establishment as parameters or embedded parts of session programs. Session program can manipulate them and configure their relationships with standard packet processing modules (packet filters, queues, routing tables, output schedulers, device interface drivers). – basic system software which implements session establishment and management protocol, basic execution environment for programs using native code, task management and basic resource management, security infrastructure (authentication and authorization policies), local session management API and facilities for device management by network administrator. This software can be changed only with administrative privileges. – pluggable modules for optional system software extensions, e. g. • address/protocol families (the architecture is independent of lower networking layers) • authentication, authorization, and accounting protocols • program interpreters and runtime support (e. g. interpreters for interpreted languages, runtime linker, JIT compilers, module that downloads given URL for execution, etc.) The model is designed as general as possible in order not to be restricted by the architecture in later development and deployment stages. All extensible

An Active Network Architecture: Distributed Computer or Transport Medium

615

information elements in session establishment and management protocol are designed with tagged polymorphic types. These modules can be downloaded by system software on demand from the code repository defined by the administrator or managed with device management facilities. IPv4 and IPv6 protocol families and C language binding will be supported by the prototype implementation. The proposed active network architecture uses a connection-oriented (state keeping) approach. Obviously, this approach is more prone to scalability problems than capsule or “fixed function set” schemes but we believe that only small fraction of all data streams in typical network will require special QoS features or other algorithms running on active nodes, so the amount of state information which must be kept within the network elements will be almost always sufficiently low and not exceeding the processing and memory capacity of the active nodes. In overload situation, new session establishment request can be simply refused, currently running session programs can be asked to release some of already allocated resources, or alternative (possibly suboptimal in other situations) paths in active network can be searched. Second, our active network is meant as overlay network on more conventional network that may use “dumb” but fast elements for data transmission only (these are located especially in the core of the network) and the active elements will be placed only in key spots of the network where special features are needed (typically near bottleneck links, at the ingress and egress of the fast core, and on gateways between different networking technologies). Using our session establishment and management protocol, it is possible to request change in parameters in atomic way (something that many signalling protocols cannot do without tearing down the running connection and trying to reestablishing it with new parameters) and negotiate permissible values of parameters (unnecessary trials and errors can be avoided in algorithms that are adaptable to various environmental conditions). The active nature of sessions have some other pleasant consequences: – In case of failure or overload of some element (even not active element itself but some “dumb” router or physical link in between), connections may be re-established or rerouted automatically without any end user or network administrator intervention and without the need to implement these actions in performance-critical packet processing code. – The session parameters can be changed dynamically by end users — such a change of parameters is processed in the similar way as the initial establishment of the session. The active router model extends the “dumb” router functionality through a family of new protocols. The protocols can be divided to two groups relating to two phases of the active packet processing — protocols for network connectivity and program loading and those for processing loaded programs. Security of this active network model is based on authentication and authorization protocols not described in this paper and security properties of other used protocols.

616

E. Hladk´ a and Z. Salvet

One of our primary goals was to develop a general network protocol which would allow us to use existing network protocols or their modifications at the presentation and application layers. To achieve that, active node code may be authorized to process not only packets from active networking aware applications but also data sent by selected “legacy” applications. In such a case, separate application has to initiate the session with active node that resides on path used by application data and use appropriate input packet filter to capture the desired packet flow. In session management protocol, the program is defined in generic way — only by code type, code length, and the program code itself. This allows different types of programs (e.g. compiled C or interpreted Java) to be run on the same active router. Due to split between session management and per-packet processing functions, it is possible to use different languages for these functions. Typical use of this feature would probably include running optimized native code in performance-critical per-packet program and implementing rest of code in convenient scripting language. Different performance characteristics of different types of code should be taken in account when calculating processing resource limits (CPU, memory, etc.), but this is an open issue in our architecture and subject to further research. 2.1

Data Plane

The actual processing of active data packets is done by program, which is (or whose identification is) supplied to the session program as part of its parameters. The session program is responsible for allocating necessary resources and setting parameters of per-packet tasks (either supplied by user or determined from the present active network state) and calling the active node API to start it up. The per-packet program is executed in a loop, this loop is permanent while the session is alive. The active program registers active packets filter — e. g. the IP source and destination addresses, and the port number or precomputed flow label value — for this particular active connection and relies on the active router which sends all such packets to the active program loop. The packets are processed (e.g. modified, deleted, duplicated, . . . ) and than sent to appropriate active router port or ports (e.g. in case of multicast-like data). The fairness between different active programs running on the same active router is guaranteed by the active router core, which uses on one side the authorization data and on the other the statistics which are collected for each individual active program (CPU, memory consumption, etc.). The active programs are scheduled with respect to already consumed resources and to the actual resources they are authorized to use. In such a way the order of processing of data packets of different active connections is not strictly dependent on packet arrival order, but it is controlled by active program scheduler.

An Active Network Architecture: Distributed Computer or Transport Medium

3

617

Implementation

We are working on implementation of the architecture described above using software routers based on the NetBSD (UNIX) operating system and off-the-shelf IBM PC-compatible hardware. Such routers are widely used in our metropolitan area network and they represent a general programmable platform suitable for implementation of novel network architectures and protocols. In addition to our previous experience, another reason to choose the NetBSD operating system was its well designed infrastructure for creating alternative OS personalities (emulations) which enables us to create (relatively easily) an execution environment where native binary (e.g. compiled C or C++) active programs can be securely executed. While this operating system environment influences decisions about computer languages for implementation and the use of particular system functions, the active network model is not restricted in any way to this environment (i.e. the NetBSD based PC routers) and is implementable in any general enough computing environment. Adapting a PC router to an active router means to introduce new features on the kernel and user levels. The most important components of our active router architecture are depicted in the Fig. 1. On the user level, the authentication and authorization module must be added, together with the full environment for the session and packet processing programs including parts of the resource management and statistics collection. On the kernel level, it is necessary to create restricted execution interface for secure execution of native binary active programs, to add more general interface to packet classification code (standard part of PC router) which recognizes data packets of active connections, and also to add some changes to support more fine-grained scheduling for active programs. Our implementation uses the C language to implement both the user and kernel level modifications and extensions of the PC router. While this means that the implementation will take more time then using high level approach with Java or similar programming environment (the implementation times compared in [4] are 3 years against 6 months), the result should be much more efficient. We believe that highly efficient implementation is necessary if we are to show the advantages of active networks.

4

Related Work

During the relatively short history of active networks research, several models or network architectures have been developed. These models can be divided to two basic groups based on means by which user code is supplied to programmable elements of the active network. The first group places the code of active program inside the data packet that will be processed by the program (“active packet” or “capsule”). The other approach (“active nodes”) uses other ways of program distribution, e.g. preloading of fixed function sets active nodes, on-demand program downloading, distributed caching of programs, etc. For example, typical

618

E. Hladk´ a and Z. Salvet JVM

resource management

JVM

security & accounting session prog.

router management pluggable module library manager

packet prog. API

session management

packet prog. (native)

session prog. (native)

USER

network interfaces

KERNEL packet classifier classical routing

shared buffer pool

accounting &resource limit checking

queue manager packet scheduler

control information

active program scheduler

data flow

Fig. 1. Active Router Architecture

representatives of the first group are Smart packets project [7], ANTS [8], and PAN [9]; representatives of the second group are SwitchWare [5] or Pronto [6] systems. Both these two architectures have specific advantages and could be combined in one model. Pronto is quite similar to our implementation of active node operating system support, in fact it could serve as alternative base for implementation of the architecture presented. The most important difference is lack of support for untrusted binary code execution in Pronto (user code interfaces with C++ class library). The SwitchWare architecture also has some features in common with the model we proposed, e.g. support for multiple programming languages for user code. On the other hand, in SwitchWare, active packets always carry code in addition to data and this code cannot be completely preloaded on active node, unless it is defined as extension of active router.

5

Conclusion

The active network protocol design and its implementation within PC routers was motivated by the work in the area of quality of services for multicast, and voice and video applications in connectionless networks [3]. The active network technology looks promising for solving these and related problems and it also

An Active Network Architecture: Distributed Computer or Transport Medium

619

provides convenient environment for research, where different QoS and/or multicast protocols can be implemented and tested. Acknowledgements The authors would like to thank Ludˇek Matyska for support of our work, proof reading this text and stimulating discussion about the quality of services in computer networks now and in the future. The work was supported by the CESNET Research intent MSM000000001, and one of the authors (EH) also acknowledge support from Universities development fund grant No:0430/2001.

References 1. D.L. Tennehouse, J.M. Smith, G.M.W. Sincoskie, D. J. Wetherall and G. J. Minden. A survey of active network research. IEEE Communications Magazine 35, 1997. 2. K. Psounis. Active networks: Applications, security, safety and architectures. IEEE Communication Surveys, 1999. 3. D. J. Wetherall et.al. Introducing New Internet Services: Why and How. IEEE Network, May/June 1998. 4. J. P. Gelas, L. Lefevre. TAMANOIR: A High Performance Active Network Framework. Workshop on Active Middleware Services 2000 at the Ninth IEEE International Symposium on High Performance Distributed Computing, Pittsburgh, Pennsylvania, USA, August 2000. 5. D. Scott Alexander, William A. Arbaugh, Michael W. Hicks, Pankaj Kakkar, Angelos D. Keromytis, Jonathan T. Moore, Carl A. Gunter, Scott M. Nettles, and Jonathan M. Smith. The SwitchWare Active Network Architecture. IEEE Network Special Issue on Active and Controllable Networks, vol. 12 no. 3, pp. 29–36. 6. G. Hj´ almt´ ysson. The Pronto Platform: A Flexible Toolkit for Programming Networks using a Commodity Operating System. In IEEE OPENARCH 2000, March 2000. 7. Schwartz, Beverly I., W. Zhou, A. W. Jackson, W. T. Strayer, D. Rockwell, and C. Partridge. Smart Packets for Active Networks. Proceedings of InfoComm, New York, 1999. 8. D. J. Wetherall, J. V. Guttag and D. L. Tennehouse. ANTS: A Toolkit for Building and Dynamically Deploying Network Protocols. In IEEE OPENARCH’98, April 1998. 9. E.L. Nygren, S.J. Garland and M.F. Kaashoek. PAN: A High–Performance Active Network Node Supporting Multiple Mobile Code Systems. In IEEE OPENARCH’99, March 1999.

An Active Network for Improving Performance of Traffic Flow over Conventional ATM Service 1

1

Emad Rashid , Takashi Araki , and Tadao Nakamura 1

2

2

Dept. of Science and Technology, Hirosaki University, Japan [email protected]

Graduate School of Information Sciences, Tohoku University, Japan [email protected]

Abstract. In Unspecified Bit Rate (UBR) service provided by ATM networks, user sends cells into networks with no feedback, no guarantee cells may be dropped during congestion. This paper describes a congestion control scheme using active network technology to avoid congestion in a conventional ATM network. Ants routing algorithm for congestion control and associated with active network fashion is implemented. The routing algorithm uses information that is monitored and revised according to the congestion status of output ports and sends commands and executable bits stream to other switching elements. The Active switching elements share information about traffic levels of an interconnection network and reciprocate customized programs to rerouting cells in the presence of congestion at switching element's output ports. As a result, it is possible to build active switching network that can avoid congestion in a conventional ATM network.

1 Introduction The Unspecified Bit Rate (UBR) [1] service category provided by ATM networks does not specify traffic related service guarantees and has no explicit congestion control mechanisms. In multimedia communication, the aggregate number of cells is characterized in a variable transmission rate, and the number of cells arriving at each link may be too large for a switch's buffer to handle. However, the cells will continue arriving at switching elements even if there is congestion in a network. As a result, the network may be prone to congestion. This phenomenon leads to a high cell loss probability inside the network, and to low network efficiency. There are several requirements for the implementation of future switching systems in a B-ISDN environment. The most important things to be emphasized in the switch designs are as follows: First, the internal fabric of a switch should be able to route cells from any of its input ports to any of its output ports without blocking. The blocking characteristic seriously limits the throughput of a switching element. Second, a switch should be intelligent and to be active on demand to avoid interconnection congestion and to gain high throughput and recognize from cells that carry active information or statistic (Passive) information. To satisfy these requirements, this paper proposes a new P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 620–627, 2001 © Springer-Verlag Berlin Heidelberg 2001

Improving Performance of Traffic Flow over Conventional ATM Service

621

control scheme in switching element that has the ability to use active information to update its information, and has capability to share active packets with adjacent switching elements concerning the congestion levels in the interconnection fabric. The congestion is controlled by regulating the input traffic of cells in a switching element that has congestion at one of its output ports. The UBR service, however, is intended for non-real-time applications, i.e., those not requiring tightly constrained delay and delay variation. Therefore, the cells that have specified as UBR cells can be deflected to reduce the high congestion level at that switch's output port. The cells that have been deflected will be distributed to arrive at other links. The control mechanism is achieved by antecedent rerouting some of the cells that are destined for a heavy-traffic link. This new routing technique, called Ants routing [2] is based on the information that has been collected in the switching elements concerning the traffic status of the output ports. The performance of the Routing scheme is then evaluated in terms of the probability of cell loss. The analytical results demonstrate that the Ants Routing scheme provides significant advantages by relieving network link's congestion and reducing the consequences of the switching elements' buffer sizes. They also show how various parameters can be used to satisfy the requirements concerning cells loss in an interconnection network. The congestion control mechanism can lead to a lower cell loss probability and a higher utilization of interconnection network resources by deflecting some cells to a route that has light traffic. The cell format is native ATM cell, which carries 48 Bytes data and 5 bytes header. There is no encapsulation issue on the cell traveling from switch to switch, but the different is the contents of the data carried by the cells whether the cells are carrying active data or passive data. However, at switch element, it has being business as usual for switching operation cells in and out, the switch will take action only if the cells arrived have active information and addressees to its destination.

2 An Active Network In this section, we provide a detail of active packet format and how can a node distinguish between packet that has active information or programming code with packet that has passive information. The switching node also needs to have supplementary components to encounter a new format of active packets. 2.1 Active and Passive Packets Format There are two types of the packets flow in the network at the physical layer; first types of the packets are user information packets or passive packets where switching nodes just route these packet from source to their destination. The second types of the packets are programming code information packets or active packets where the switching nodes take consideration to accumulate the codes and execute them to perform specific action such as active congestion control or change routing table. The switching node needs to know the type of the packet and to discern which packet is active or passive. This paper proposes a way that the switching node can discern the

622

E. Rashid, T. Araki, and T. Nakamura

kind of the packet by modifying the unused bits in ATM header, i.e. Payload type PT, and from Virtual Path Identifier (VPI) and Virtual Channel Identifier (VCI) in the ATM header format. ATM standard defines a fixed size cell with a length of 53 octets comprised of a 5octet header and a 48-octet payload. Two headers format are also defined for usernetwork interface UNI and network-network interface NNI (as shown in Fig. 1). 5 Octets UNI

NNI

VPI

VPI

VCI

PT

VCI

PT

VPI: Virtual path identifier VCI: Virtual channel identifier

PT: Payload type

Fig. 1. Cell header at the UNI and NNI ATM is a connection-oriented protocol needs a connection to be established before user traffic can start flowing between communication entities. The connection setup is preformed via signaling processing to establish new VCI, VPI and virtual path connection identifier VPCI. The VPCI is introduced to discrepate the connection whether the connection between an end station and a network or between two networks. For active packets that directed to a specific node the value of VPCI and VPI are equal in the routing table at that node. Another active packet discerner is payload type field in the ATM header, this field is three bits size and used to carry information that network needs for its operation and maintenance as well as congestion indication bit. The payload type identifier has some values reserved for future functions, e.g. PT value (111), this value can be used for Active packets and the node can distinguish active packets from passive packets. 2.2 Active Switching Node Architecture The switch element (shown in Fig. 2) has Active control unit that performs routing of passive packets and executing a program code in active packets. Beside the routing table that switching node has, there is a supplement memory called Binary Link Status (BLS) table for storing a congestion status of switching input/output ports. The information in the BLS table that shares with adjacent switching elements has three traffic levels (weights). These levels value represent congestion level at the input/output links that are used to reroute the packets in the interconnection network. The control unit (shown in Fig. 3) is perform routing of passive packets in interconnection network by modify the VPI field which is corresponding to the VPCI value in the routing table. When the packet arrival at the node has VPI value equal to the VPCI in the routing table and also has PT value equal to (111) the node will consider this packet as active packet. The node will accumulate all active packets arrived in the accumulator part and loaded to the memory unit to be ready for execution. The effect of program execution is the production of processed data or

Improving Performance of Traffic Flow over Conventional ATM Service

623

results, which may implement modifying the routing table or updating the BLS table related to congestion level at the links.

Link 1

nxn crossbar switch

Link n

Link 1

Link n

Control Unit

00 00

Memory Active node

DM: data management

DM 00 01

00 00 BLS table

Fig. 2. Switching Architecture

Active Packets Stream

CPU Loader

Accumulator

Memory

I/O

Fig. 3. Active node Control Unit

624

E. Rashid, T. Araki, and T. Nakamura

3 Congestion Control A multi-stage non-blocking interconnection network is proposed as a means of constructing self-routing switch elements ATM interconnection networks. Neighboring switching elements are connected to each other through control links, to transfer information about the traffic status of links. The traffic on a link may be at a light or normal level β a heavy level ζ or a congested level Ξ, where β, ζ and Ξ are represented in binary form as 00, 01, and 10, respectively. All this information on each link's status is stored in the BLS table (as shown in Fig. 1). A state of congestion is detected by the buffer controller which is part of control unit, when the load at an output buffer exceeds the throughput of the link, that is, when the number of cells inside the buffer is larger than a certain threshold. Furthermore, the controller supervises the traffic passing through the output buffer. In our switch, we assume that traffic at an output buffer is normal when the number of cells in the buffer is less than 80% of the buffer size, heavy when the number of cells in the buffer exceeds 80% of the buffer size, and congestion when the number of cells in the queue reaches or exceeds 90% of the total buffer size. The buffer controller can monitor these states and set a value in the corresponding field of the BLS table. Each switch has three kinds of control: First, in normal traffic, the switch's control unit routes the cell to a destination port according to each arriving cell's header. Second, in heavy traffic, when the link has few available resources, the switch's control unit starts deflecting cells from their original links to other (alternative) links. Third, when there is congestion at one of the switch's output ports, the link has no more available resources to accept arriving cells. Therefore, the control unit has to change the information in the BLS table that is related to the traffic status of the switch's input port. The BLS table's new values for the input ports will be transferred to neighboring switching elements. The status of each link based on the three traffic levels are represented in binary form (00, 01, 10) and stored in the BLS table. 3.1

Cell Sequence Integrity Assurance

In the Routing scheme, some cells that have the same virtual path may be deflected to alternative routes. Therefore, cells with the same virtual path will travel by using different routes. Several problems, however, may arise for deflecting packets: these problems are the arrival sequence of cells and delay of cells. The cells may arrive at the destination out of order. In other words, later cells may arrive before earlier cells. For cell delay problem, the routing scheme is applied to UBR service, which is intended for non-real time applications, such as file transfer and email. Therefore, cells delay are not requiring tightly constrained. In ATM networks, all cells that have the same virtual path must be received at the end of the connection in the same order as they were transmitted. It means that all cells must be in sequence. In normal traffic conditions, since cells with the same virtual path take the same path across the interconnection network, it is possible to keep track of the cells' sequence. When the traffic at the output port becomes heavy,

Improving Performance of Traffic Flow over Conventional ATM Service

625

this will be reflected in the value in the BLS table. The value of the corresponding output link in the BLS table will change from state β(00) to ζ(01) Therefore, cells addressed to this output port will immediately be affected by the change and will be routed to other links. As a result, cells that have the same virtual path may have different actual paths. The delivery of the cells in the correct sequence and with no errors should be guaranteed. In our network, the cell sequence correction process can be performed at the end of the connection, that is, at a destination node. The destination consists of the cell distributor CD, main buffer MBF, lateral buffer LBF, and selector (as shown in Fig. 4). The LBF, which is similar to the virtual channel described by Dally [3], consists of several independent lanes, each of which can hold one cell. In addition to the address field in the cell header, there is another field called the cell sequence number (SN) to ensure that the cells' sequence is maintained. The cells' sequence numbers were fixed when the cells are generated by a source node. The main function of the distributor is to check at the sequence number (SN) field. Cells that have the correct SN will be sent to the main buffer, and other cells will be delayed in the LBF until all previous cells in the sequence have passed through the MBF. The purpose of this scheme is to sequence cells so that the cells of the received message will be in the same order as those of the transmitted message. Buffer controller CD Selector

MBF: main buffer LBF: lateral buffer CD: distributor

Outlet

LBF

Fig. 4. Buffer controller at the destination node 3.2

Analytical Results

This subsection presents the results obtained through the analysis in the previous subsection. The purpose of the analysis is to compare the cell loss probability with the Ants Routing strategy and that without the Ants Routing. So far, the analysis of the performance of the switch elements under the Ants Routing scheme has been based on the input load deflection of the switching elements. The arrival rate of cells at a switch with congestion at one of its output ports will be reduced to a specific level. The deflected cells will be distributed among other switching elements that have low traffic congestion levels. The results show the probability of cell loss at one stage that

626

E. Rashid, T. Araki, and T. Nakamura

has congestion in one of its switch elements. Our main concern is to minimize the size of the buffer required, while maintaining a low cell loss probability, i.e. around 10-9. As an example, we assume that the number of switch ports is 4 and that the number of switching elements at one stage is 4. We suppose that the traffic level at o a certain output port reaches the congestion level ( λ n = 0.9), which means that the traffic arriving at a certain output port will occupy 90% of the output buffer. The cell loss probability is raised by increasing the load on one output port. One approach to maintaining a low cell loss rate is to increase the buffer size. However, increasing the buffer size is costly and contrary to our policy of minimizing the buffer size. Fig. 5 shows the cell loss probability as a function of the buffer size for various values of the offered load ρ on each switch element at a stage. The figure shows the cell loss probability without the Ants Routing scheme (dashed curves), and with the Ants Routing scheme (solid curves). We set the deflection rate at γ = 0.3. The figure that the required buffer size with Routing scheme must be more than 30 cells per output port in order to preserve a cell loss rate of less than10-9. The required buffer size (H) is very important for minimizing the switch element size and for reducing the switch cost. 1.00E+00

Cell-loss probability

1.00E-01 Without Ants Routing

1.00E-02 1.00E-03 1.00E-04 1.00E-05

Load=0.85

1.00E-06

Load=0.85

1.00E-07 1.00E-08

Load=0.9

1.00E-09

Load=0.9

With Ants Routing

γ = 0.3

1.00E-10 5

10

15

λon = 0.9

20

25

30

Buffer size (H)

Fig. 5. Cell-loss probability relative to the load on a certain output port Fig. 6 shows the effect of buffer size in the Ants Routing scheme on the cell loss o probability for various load levels ( λ n = 0.85, 0.9, 0.95) at a congested output port

λon . Note that dashed lines in the figure indicate a network without the Ants Routing control scheme. From the results (shown in Fig. 6), the required buffer size depends on the loads in the switch elements and the load at a certain switch's output ports. Therefore, if we set the deflection rate to γ= 0.4 and the offered load ρ on the switch element to 0.9, we can satisfy the requirement of a cell loss rate below 10-9. Consequently, Ants Routing can be a powerful technique for minimizing buffer

Improving Performance of Traffic Flow over Conventional ATM Service

627

requirements, particularly for non-uniform traffic. It can be seen from the figure that the required buffer size without using the Ants Routing scheme has to be very large to obtain the same performance as with Ants Routing. 1.00E+00

Cell-loss probability

1.00E-01

Without Ants Routing

1.00E-02

o λCON=0.85 n = 0.85

1.00E-03

o λCON=0.85 n = 0.85

1.00E-04

o λCON=0.9 n = 0.9

1.00E-05

o λCON=0.9 n = 0.9

1.00E-06 1.00E-07

With Ants Routing

1.00E-08

o λCON=0.95 n = 0.95 o λCON=0.95 n = 0.95

γ = 0. 4

1.00E-09 1.00E-10 5

7

9 11 13 15 17 19 21 23 25

Buffer size (H)

Fig. 6. Probability of cell loss relative to the buffer size (H) for various load levels at a certain output port

4

Concluding Remarks

In this paper, we propound a new self-routing switch algorithm called Ants Routing for congested networks. We asserted that switch elements should be intelligent and should activate switch control algorithms in response to traffic congestion. The switch network performance can be enhanced using active network technology to avoid congestion in a conventional ATM network. Analytical results show that our technique can significantly reduce the cell loss probability and relieve network congestion by deflecting cells to other paths. As a result, switch interconnection network resources can be used more efficiently.

References 1. 2. 3.

ATM Forum Technical Committee: Traffic Management Specification Version 4.0, (1996) af-tm-0056.00. E. Rashid, H. Kobayashi, T. Nakamura: Ants Routing: An adaptive Packets Flow Control Scheme in Multimedia Networks. Proc. of the IEEE ICUPC ’93 (CANADA), (1993) 228-234. W. J. Dally:Virtual-Channel Flow Control. IEEE Transactions on Parallel and Dist. Sys., vol. 3, no. 2, (1992) 194-205.

An Active Programmable Harness for Measurement of Composite Network States Javed I. Khan and Asrar U. Haque Internetworking and Media Communications Research Laboratories Department of Math & Computer Science, Kent State University 233 MSB, Kent, OH 44242

Abstract. In this paper we present the active harness, a scalable and versatile means for deep probing of network local states. The approach makes a clear separation between the “communication” from the “information” part of the probing process. The composition of the “information” component is handled by means of network embedded harness plug-ins. It can facilitate not only a new generation of network aware applications but also network problems.

1

Introduction

Measurement and exchange of state information inside a network is a meta service. The ability to construct any global optimization service, whether in network layer or above, depends on how well the decision systems are aware of and up-to-date on the relevant local states in pertinent network elements. For example, local link state information is the building block for routing services and BGP, OSPF, or MPLS [2] all require sophisticated cost metric from local nodes following complex propagation patterns. There are also host of other advanced network services (such as dynamic QoS provisioning, mobile IP forwarding), and new generation of applications (such as distributed server, proxy prefetch) all requiring exchange of such network state information. A prerequisite to any QoS provisioning, whether by dynamic resource allocation or by reservation, is the knowledge about the resources. Distributed caching requires information such as current congestion and current delay to assign best mirror server to a request. Clearly, with the complexity of the Internet and the push for optimized services and applications it is becoming increasingly more important to find the means for monitoring and propagating various complex network state measurements. In this paper we present the concept of active harness designed for provisioning this crucial meta internet service. Before presenting the proposed system below a brief account of the current state of the Internet probing technologies is given.

1.1

Related Work

Simple Network Management Protocol (SNMP), designed in 1990 and (RFC 1157 and RFC 1155) latest updated in 1995 was the first to provide a simple but systematic way of monitoring the Internet states. It’s current version SNMPv2 [2,11] now provides a simple point-to-point measurement framework. It defines a set of P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 628–638, 2001 © Springer-Verlag Berlin Heidelberg 2001

An Active Programmable Harness for Measurement of Composite Network States

629

important variables into a database called management information base organized into 10 categories of information (Current version MIB-II) and allows nodes to send simple point-to-point UDP based queries. SNMP has been very successful in providing the required standardized organization, syntax and representation (ASN.1) for a base set of critical state information. However, its communication model is still point-to-point. Consequently, composite measurements cannot be made easily using SNMP. Because of the difficulty in its scalability, SNMP has been used more successfully in network management and monitoring than in dynamic run-time querying. Optimizing systems that need network wide information propagation therefore generally build their own custom mechanism. Routing information propagation in IGP, OSPF, BGP all are classical examples of this situation. Video multicast group management and synchronization require tracking of jitter and round trip delay. RTP and RTCP [12] have been proposed to collect custom time related statistics over a multicast tree. Similarly, pathchar [7], cprobe, bprobe, [1,9], woodpecker [3], and host distance estimation tool [5] have been proposed targeting various specific measurements. In this context, this research proposes a novel system that can address two emergent issues in network probing-- scalability and versatility, and these are illustrated below.

1.2

Scalability

Point-to-point mode of communication often severely limits scalability in a large network. For example, for measurement of path statistics the requesting node is required to send individual SNMP messages to all intermediate nodes. Consequently, redundant information flows inside the network increasing the overhead, severely reducing the transparency of the measurement process. Dissemination/aggregation of information with only a point-to-point communication means creates excessive traffic on the network severely limiting the scalability. It seems much of the limitations arises because SNMP cannot extract any intelligence from the intermediate nodes. Since there is no means for in network composition, all compositions must be done at the end-points, only after polling all state information there.

1.3

Versatility

On the other hand, the specific probing kits provide greater scalability but hardly can be reused for other measurements. Nevertheless, the trend suggests that versatility of the information is becoming equally important. Exactly, what measurement is useful depends on the optimization objective. For example, in a video server scenario, whether the jitter or the hard delay is more important is dependent on the specific video repair algorithm. In a different scenario, a server before sending data may want to poll information about the speed of only the last link to the home user’s computers. In some other scenario the min/max of the path downstream delays and jitters from various junction nodes can help in strategically placing jitter-absorbing buffers in a multimedia streaming virtual private network tree. Emerging tele-interaction applications (such as tele-surgery, remote instrument control) will require handle on the delay incurred at the video frame level, which is exactly not the same as the packet delay. The trend suggests that as more advanced, and complex netcentric

630

J.I. Khan and A.U. Haque

applications are being envisioned more versatile network state information would have to be exchanged. * : Update Generator ^ : Update Aggregator

Request

S

+ : Request Generator x : Reply Generator # : Reply Aggregator

+#^

A

+x # *^

+x # *^ D

J x

E

+x *#

H

+x *#

K

L x

x

x

x

O

Update

I

Reply

+x *# M

C

P

+x *# Q

x

x

R

x

Fig-1 Components of Active Harness

1.4

Our Approach

Can scalability and versatility both be retained simultaneously? Apparently, there may not be any efficient answer in an end-to-end paradigm. In the general case, a network can choke with polynomial messaging at the end-points. However, the recent advent of Active Network technology seems to offer an innovative way out from this dichotomy [13,14,8]. Active network allows programmable modules to be embedded inside network junctions. In this research we propose an experimental dynamic mechanism for state information polling and propagation inside network with similar embedded information synthesizers, which seems to be both scalable and versatile. The approach first makes a clear separation between the “communication” from the “information” of the state exchange and propagation process. Communication is handled by the component called “harness”. Harness propagates all information via coordinated messaging. On the other hand the “information” component of the process is controlled by a set of soft programmable plug-ins. These plug-ins decide the content of the messages propagated by the harness. In this paper in section 3 first presents the architecture of the proposed system. Section 4 then illustrates the operation of the harness for a typical application. Finally, in section 5 we share both analytical and empirical results depicting the performance of the proposed harness system.

2

Harness Architecture

The harness is responsible for initiating, propagating and responding to a series of well-coordinated messages between the nodes in a network. The harness once installed in network nodes, can act in three roles-- initiator, state synthesizer, and terminals. The initiator acts as the communication agent in the network layer for the

An Active Programmable Harness for Measurement of Composite Network States

631

application that actually requires the information. The synthesizer propagates the state requests and processes the returning states from the terminals. The harness controls the communication pattern and thus deals with the efficiency of messaging. Harness system accepts a set of plug-ins, which determines the content of these messages, and how they are propagated and aggregated at the junction points.

2.1

Messaging

The harness system has been designed to operate with a novel request-reply-update messaging scheme. It has three types of messages request, reply and update. A request message contains fields indicating what information it needs, and dictating how far down the network the probing session should propagate, i.e. level, and any information needed by the receiver to compute required data, e.g. to compute the jitter a receiver needs to know the time stamp of sending successive data. The request initiator decides how often a request is generated. The request messages are sent to the terminals if they are immediately connected, or to synthesizers for further downstream propagation. A synthesizer upon receiving a request propagates the query by generating a new request message to the down-stream nodes. However, at the same time it might also generate an immediate reply for the requestor. The replies from synthesizers may contain current local state and/or past remote states. The terminal nodes send replies to their respective requestors. The terminal reply contains locally retrieved current states. In the return trip of information, the synthesizer nodes aggregate the information and at each stage generate update messages for their requestors. Once a node receives all or specific number of update messages from its immediate down-stream nodes or on timeout, it updates the network local state variables and generates a new update message. The update message contains a synthesized summary of information calculated from all its immediate downstream nodes. This three-part request-reply-update communication model, if needed, allows the information to be collected without working in lockstep. Even if a node downstream is delayed or silent, it does not hold the entire system; the estimation process can proceed for remaining nodes. The update phase is further equipped with optional and configurable timers to avoid update lockup. In essence, the request-reply phase allows collection of local immediate states. The reply mechanism allows immediate probing into current local states and past synthesized remote states, while the update message retrieves latest remote states.

2.2

State Composition

Harness system accepts a set of five plug-ins which are called request generator, reply generator, reply aggregator, update generator, and update aggregator. These modules together determine the content of these messages, and how they are aggregated at the junction points. They work via a virtual slate. A copy of which is maintained in each of the nodes. The slate works as the local abstract data structures. The slate is programmable and is defined at the session initiation phase. The request generator specifies the request message describing the fields it wants from the slate of

632

J.I. Khan and A.U. Haque

its down-stream node. At individual nodes the model supports MIB-II and thus acts as a superset of SNMP. The terminal nodes can read/copy MIB variables (or their processed combination) existing in the local slate into variables marked for reply. The harness then invokes the reply messages with the designated slate variables. Reply aggregator (or update aggregators) in a similar fashion is invoked each time a reply (or update) is received by the harness. They perform domain specific processing of the reply message fields and similarly update their own slate variables. The update generator is invoked when a special trigger variable becomes true. The trigger variable is a set of conditions such as all, any, or a specified number of down-stream nodes have updated/replied, or a timer fires. The update generator sends the slate variables synthesized by the update aggregators to the upstream node. Fig-1 describes the architecture of the proposed harness system. It shows the roles, the typical locations of the plug-in modules and the direction of the messages. At the heart of the composition ability is the transfer functions of the intermediate synthesizers. The request and update phase can be represented by equations: G t G i, j ,− −, j ,k j j j ….(1)

S t = Φ (Ε(Qt ), M t , S t −1 ), and Qt = F (S t ) H H S t j = Ψ ( F ( Pt − , j ,k ), M t j , S t j−1 ), and Pt i , j , _ = E ( S tt )

….(2)

j Here St is the local slate state at event time t at node j, λn is the request receiving

o

G

filter (RRF), M is the local network state (such as MIB variable), F is the request i,j,-,j,k forwarding filter (RFF). Qt is the arrived request from parent i, to node j and Qt is

H

H

the propagated requests to children k. E is the update forwarding filter (UFF), F is -,j,k i,j,the update receiving filter (URF). Pt is the arrived update from child k, and Pt is the propagated update to parent i. While, the filters determined the information propagation rules, composition functions Φ () and Ψ () together determine the message content. While, in principle each of these components for each of the individual harness sites can be programmed differently, however the associated management will be intractable. In this harness we divide the network nodes into subsets based on their role in the topology. Nodes in the topological subsets then inherit uniform programmed behavior. Thus, we need only five distinct programmed modules (plug-ins) to be supplied by the harness programmer.

3

Harness Execution Model

The harness operates through 8 states. Fig-2 shows the state transition diagram. The oval shaped boxes describe activities and the square boxes indicate plug-in modules used for those activities. The initiator have states 1-3-4-5-1 if it generates a request of level 1 and if reply is expected, otherwise if level is 1 and reply is not expected then it has states 1-3-1. If the initiator generates a request message of level more than one, and reply and update is expected, then it has states 1-3-4-5-6-7-1. The terminal nodes have states 1-2-1. Parents of terminal nodes (if both reply and update is expected) have states 1-2-3-4-5-8-1. Other synthesizers (if both reply and update is expected) have states 1-2-3-4-5-6-7-8-1. As fig-2 suggests, other combinations are possible depending on whether reply and/or update is not expected.

An Active Programmable Harness for Measurement of Composite Network States

633

R eply Ex pec ted R eply R ecv d G en R eques t Wait for R eply Proc ess R eply 4 5 3 R eques t R eply G enerator Aggregator r o R ep p ly ly N ot E R e ut n x o p ec t O n T im e to r ed i ti a r U ted pec o l Ex t ot i N te p pda a U If in i ti da Its =N te E o t in no h i ld Its n xp t in ec fI c te d i ti a to r G enerate R eply Wait for U pdate G en U pdate 1 6 8 R eply O n R ecv ing U pdate Proc ess U pdate G enerator 7 or U pdate Its th d a te p e in it U n ia to r Aggregator O n im e o u t T Its not i n i ti a to r

O n R ecv ing a R eques t

G enerate R eply 2 R eply G enerator

F ig-State 2 Stat Transition e T ra n sit io n Diagram D ia gr am oof f AActive ct iv e H ar ne ss Fig.2 Harness

5

4 5 5 e 2

c

k1 3

5

4

4

8

7

S

9

2

k5 4 4

4

k6 2

2

2

k7 4 4

10

2

2

b 2 10

d f

5 h 3

3

4

2 k2 5

3

5

2

2

3 8

2

7

2

4

g 2 2

a

9

10

5

k4 4

3 k3 3

4

2

2 3

2 i 2 g .… 3

Fig-3 Transcoder Auto Stabilization using Active Harness

4

Example Probing: Transcoder Step Computation

Below we present an example of custom harness service that helps in configuring an embedded video transcoding tree network. In a multicast distribution tree a video transcoder [15] sits in the junction nodes and steps down the video rate to match the downstream path capacities. The rate of the individual links however cannot be determined just with node or link local information. The step-down parameters are quasi-global state dependent. The optimum rate assignment is a function of the upstream and downstream paths, requirements of the sinks as well as the delivery capacity of the source. Below we show how the harness system can be ‘programmed’ to configure the transcoding network in a two-phase request/update cycle.

634

J.I. Khan and A.U. Haque

Let us consider the transcoding network of Fig-3. Each transcoder junction node has to know the amount of video it is getting from its parent via up-link and the maximum possible amount of video that can flow through all its down-links. The values have to be determined optimally so that it does not receive more than what it can deliver or what is required down the stream. AppxChildBW [ ] : float, UsableChildBW [ ] : float, TreeLevel : int, MaxDownLinkTreeBW : float, UpLinkBW : float, SinkOrSourceCapacity : float (All are initialized to –1)

RequestMsg: MsgType:HarnessVariable, DeliverableRate: float, Level: int ReplyMsg: MsgType: HarnessVariable, Recvable: float UpdateMsg: MsgType: HarnessVariable, MaxRecvable:float

Fig-4(a) Slate

Fig-4(b) Message Definitions

Request Generator Module { if (it is a source) UpLinkBW= SinkOrSourceCapacity; for each child I { RequestMsg.DeliverableRate = min (UpLinkBW, AppxChildBW[I]); >> Send RequestMsg to child [I]; > Send Reply Message; > Send Update Message; are send by the harness)

Fig-4(c) Relevant Pseudocode of Modules

We map the initiator at the video source and the terminals at the video sinks and the synthesizers in each of the intermediate nodes. The slate, messages and the five plug-in modules are shown in Fig-4 (a)(c). The process begins from the source. It sends a request, which contains its maximum delivery capacity. Each of the synthesizers regenerates a new downward request, which shows the maximum deliverable video rate, recomputed by the request generator plug-in modified by its local downward link capacity. When, the terminal receives the request it then compares the value with its sink capacity, and determines the bandwidth receivable based on the deliverable and its sink capacity. The synthesizers above the terminals collect the

An Active Programmable Harness for Measurement of Composite Network States

635

bandwidth receivable values and compute their own bandwidth receivable based on the maximum demand and past value of bandwidth deliverable. The information eventually propagates upward to the source. In this example (fig-3) there is a source − S, a, b, etc. are intermediate nodes, and k1, k2, etc are video sinks. The numbers beside the edges denote bandwidth of that link. For example, the bandwidth of link ac is 9 Mbps. The source, S, can generate video at a maximum rate of 10 Mbps and the capacity of sink k1 is 3 Mbps. The numbers in rectangles indicate bandwidth deliverable that the parent sends to respective child in the request message. The numbers inside the circles indicate the bandwidth receivable that can be absorbed by down-links and are carried by the update messages. The update messages propagate from the sink towards the source carrying the maximum units that can be absorbed. Before a request is generated, the concerned nodes approximate the bandwidth of all the children using SNMP. Each node maintains two lists. The list AppxChildBW initially stores the approximated bandwidth of respective child and the other list UsableChildBW finally has the maximum bandwidth that respective child should receive. MaxDownLinkTreeBW stores maximum bandwidth up to level of TreeLevel. UpLinkBW stores the bandwidth of the link connecting it to its parent. SinkOrSourceCapacity stores the amount produced or absorbed by it if it is a source or a sink respectively. Here we have demonstrated an instance how an application can benefit from the harness in deep probing. The harness system can also facilitate collection of other common forms of global information such as jitter, and end-to-end delay. It can also probe variety of precise and detail pseudo-global and local network states which are not easily accessible today, such as “end-points of the most constrained link in a path”, “jitter across the m-th hop down-steam”, “aggregate of outgoing bandwidth from a target node” etc. All it needs are different composition rules.

5

Performance

Below we provide estimates of the impact on the links and on the nodes due to the harness operation respectively for one execution/propagation wave. Here L and B stand for a probing depth level and branching factor of the context network tree respectively. The sizes of the Request, Reply, and Update are of r, p, and u bytes respectively and computational impact due to request generator, reply generator, reply aggregator, update generator and update aggregator are rg, pg, pa, ug, and ua respectively. Table-1 shows the network wide traffic, message per link and the byte density. The terminals do not generate updates hence terminal links do not carry update messages. Table-2 shows the computational impact on the network nodes due to the plug-in. A particular state probing session may be launched with a subset of capabilities (such as no reply, but update). The design objective is to provide the least impact communication for the given application scenario.

636

J.I. Khan and A.U. Haque

Table-1 Link Traffic Impact Type Request

Byte

Max Msg

Msg/link

Bytes/link

Reply

r p

B L+1 B

1 1

r p

Update

u

B

1

u

L

L

Table-2 Node Processing Impact Node

Request

Initiator Synthesizer Terminal

UPDATE

Reply

Update

Generator

Generator

Aggregator

Generator

Aggregator

θ(B,rg) θ(B,rg) 0

0 θ(B,pg) θ(B,pg)

θ(B,pa) θ(B,pa) 0

0 θ(B,ug) 0

θ(B,ua) θ(B,ua) 0

CYCLE

VS.

HARNESS

UPDATE CYCLE VS. MSG. 5

0 0

0

EL AY 0 (se 0 c) 0

EL AY 5 (se c) 0

0

5

0

0

5

5 5 5 UPDATE AGGREGATION TIME (sec)

0B

MSG=1

0B

MSG=50

0B

5

1

2

3 4 TRANSPORT LATENCY (sec)

MSG=100 01s

Fig-5(a)

d=0.

05s

d=0.

0 1s

5

6

d=

Fig-5(b) BACKGROUND TRAFFIC 1.00E+14

1.00E+14

1.00E+12

1.00E+12

1.00E+10 M AXLO 1.00E+08 /A AD VG(bp 1.00E+06 LI s) 1.00E+04 NK 1.00E+02

1.00E+10 LI NK 1.00E+08 LO AD 1.00E+06 (bp s) 1.00E+04 1.00E+02

1.00E+00

1.00E-02 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 1.00E+00

PP,BF=2 PP,Avg B t /L l H,MS=100,BF=2

PROBING DEPTH (d) PP,BF=4 PP,Avg B t /L l H,MS=1K,BF=4

PP,BF=8 PP,Avg B t /L l H,MS=10K,BF=8

-5(c) Fig5(c) Fig.

We have also performed statistical simulation to project the performance of the harness system under various constraints. The performance depends on the

An Active Programmable Harness for Measurement of Composite Network States

637

characteristics of the programmable components (complexity of the plug-ins, message size etc.) as well as on the network (such as bandwidth, topology, probing depth etc.) and platform characteristics (scheduling delay, messaging delay, etc). Fig-5(a) shows how one request/response cycle time varies for various plug-in execution time (xaxis) of the update for three orders of message sizes (1K, 100 bytes, and 10 bytes). In cyclic mode this also represents worst case bound on the information recency. Fig5(b) shows the update delay with respect to the transport layer messaging delay. Another important metric from the network point of view is the background traffic that the harness operation creates for information collection. Fig-5(c) compares the scalability of the harness system as compared to a point-to-point mechanism. It plots the network “hum” (the background traffic generated by the probing process) for various depth and branching factor of the topology. It plots nine cases. The first three curves shows how the hot-spot “hum” (y-axis) near the probing root grows in the case of point-to-point mechanism with the increase in the depth of probing (x-axis) for three branching factors (BF=2,4,8). The second set of three curves shows the average hum for the same three cases, which is somewhat lesser but still grows rapidly with the probing depth. The average hum provides a measure that how much traffic on the average will be contributed by random spontaneous probing processes appearing at various network locations. On the other hand, the ‘hot-spot’ hum indicates the change that the application trying to probe, itself has, to be chocked with excessive surrounding probing traffic. The last three plots show the “hum” due to harness process (for three message sizes) (right y-axis). The dramatic scalability of the harness probing is quite apparent. As, can be seen that the hum in harness scheme is not only low but also flat. The result is not unexpected. The network embedded synthesis removes traffic information redundancy.

6

Conclusions

The key to the system’s scalability and versatility are the embedded aggregators. Since local state dependent aggregation is performed inside a network, it reduces communication and thus enhances the system’s scalability. Aggregators also provide the ability to compute network relative deep composite statistics, over the elementary MIB-II variables, thus enhancing the versatility of its ability to collect network states. The scope of this paper does not permit discussion on implementation. It is nontrivial nevertheless can be realized at user space as deamons. Embedded implementation can cut down some overhead and will be critical for sub-second range probing cycles. Implementation on some form of active platform [8,13,14] can further facilitate matters such as remote deployment, and seamless secured execution of the plug-ins. The harness plug-ins require very limited form of programmability compared to general active net proposal. Also, the read-write suggestions are through local slate variables only. These characteristics assuage many of the security concerns. The proposed harness is perhaps one of those cases where provisioning even very low-grade programmability can be highly rewarding. The harness increases state visibility of network. In effect it facilitates high pay off smart optimizations for numerous applications, which are not possible today due to the black box nature of current network. Interestingly, such a network layer utility is not only crucial for building a new generation of network aware applications but it is also vital for many

638

J.I. Khan and A.U. Haque

of the current problems internet is grappling with. Interestingly many of which are arguably artifacts of the opacity of current network design. Currently, we are exploring its active network based simulation. The work is being supported by the DARPA active network Research Grant F30602-99-1-0515.

7

References 1. 2. 3. 4. 5. 6. 7. 8.

9.

Carter, Robert L., Mark E. Crovella. Measuring Bottleneck Link Speed in Packet-Switched Networks. Performance Evaluation 27 & 28 (1996), 297-318. Comer D. E., Internetworking with TCP/IP, Principles, Protocols, and Architectures, 4th Ed, Pretice Hall, New Jersey, USA, ISBN- 0-13-018380-6, 2000 Dong, Yingfeng, Yiwei Thomas Hou, Zhi-Li Zhang, Tomohiko Taniguchi. A server-based nonintrusive measurement Infrastructure for Enterprise Networks. Performance Evaluation 36-37 (1-4), 1999, 233-247. Downey Allen B., Using Pathchar to Estimate Internet Link Characteristics. http://ee.lbl.gov/nrgtalks.html, April 1997. Francis, P., Sugih Jamin, Vern Paxson, Lixia Zhang, Daniel F. Gryniewicz, Yixin Jin. An Architecture for a Global Internet Host Distance Estimation Service. Proceedings IEEE INFOCOM New York, 1999. Jacobson, V., Traceroute, [URL: ftp://ftp.ee.ibl.gov/traceroute.tar.Z,] 1989. Jacobson, V, Pathchar- a tool to infer characteristics of Internet paths, [URL: http://ee.ibl.gov/nrgtalks.html ], April 1997. Javed I. Khan, S. S. Yang, Medianet Active Switch Architecture, Technical Report: 2000-01-02, Kent State University, [available at URL http://medianet.kent. edu/ technicalreports.html, also mirrored at http:// bristi.facnet.mcs.kent.edu/medianet] Matt Mathis, Jamshid Mahdavi. Diagnosing Internet Congestion with a Transport Layer Performance Tool. Proceedings INET, 1996, Montreal Canada.

10. Paxson, V., Jamshid Mahdavi, Andrew Adams and Matt Mathis. An Architecture for Large-Scale Internet Measurement. IEEE Communication Magazine, August 1998, 48-54. 11. Rose, M.T., & McCloghrie, K. How to manage your Network Using SNMP, Englewood Cliffs, NJ, Pretice Hall, 1995. 12. Schulzrinne, H., S. Casner, R. Frederick, and V. Jacobson. RTP: A Trasport Protocol for Real Time Applications, RFC 1889, 1996. 13. Tennenhouse, D. L., J. Smith, D. Sincoskie, D. Wetherall & G. Minden.. A Survey of Active Network Research. IEEE Communications Magazine, Vol. 35, No. 1, Jan 97, pp 80-86 14. Wetherall, Guttag, Tennenhouse. ANTS: A Tool kit for Building and Dynamically Deploying Network Protocols. IEEE OPENARCH'98, San Francisco, April 1998. Available at: http://www.tns.lcs.mit.edu/publications/openarch98.html 15. Javed I. Khan & S. S. Yang. Resource Adaptive Nomadic Transcoding on Active Network, Applied Informatics. AI 2001, February 19-22, 2001, Insbruck, Austria, [available at URL http://medianet.kent.edu/, also mirrored at http:// bristi.facnet.mcs.kent.edu/medianet] (in press).

Protocol Design of MPEG-4 Media Delivery with Active Networks Sunning Go1 , Johnny W. Wong1 , and Zhengda Wu2 1 Department of Computer Science, University of Waterloo, Waterloo, Ontario, Canada N2L 3G1 {scgo,jwwong}@bbcr.uwaterloo.ca 2 School of Information Technology, Bond University, Gold Coast, Queensland 4229, Australia [email protected]

Abstract. Traditionally, the Internet supports best effort service. The quality of service available to real time applications such as the delivery of video and audio is therefore difficult to predict and control. Two new technologies have emerged recently, namely the MPEG-4 standard and active network, for media data compression and data networking, respectively. MPEG-4 uses a content or object-based representation. It supports object-based scalability and, in particular, it allows the modification or editing of objects without having to first decode them. Active network allows program code to be loaded dynamically into network nodes. In this paper, we describe a system for real-time media delivery that exploits the strengths of MPEG-4 media encoding and active networks. It is based on a best-effort transport service. Our system performs congestion avoidance, error concealment, and media scalability.

1

Introduction

The delivery of various media, such as audio, video and still images, is growing explosively in the Internet today. However, the current Internet typically supports best-effort service. The quality of service (QoS) available to real time applications such as the delivery of video and audio is therefore difficult to predict and control. QoS support may be achieved by a transport service with resource reservation, e.g., RSVP [1] or differentiated services [2]. Media delivery control techniques can also be used at the end systems to overcome the deficiency of the best-effort service provided by the transport network. These include congestion and jitter control performed at the source or the receiver or both (see for example [3] [4]). Most techniques are designed for the MPEG-1 or MPEG-2 media data compression standards. Two new technologies have emerged recently, namely the MPEG-4 standard [5] and active network [6], for media data compression and data networking, respectively. MPEG-4 uses a content or object-based representation rather than a pixel-based representation as in MPEG-1 and MPEG-2. It supports objectbased scalability and, in particular, it allows the modification or editing of objects without having to first decode them. Active network allows program code to P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 639–647, 2001. c Springer-Verlag Berlin Heidelberg 2001 

640

S. Go, J.W. Wong, and Z. Wu

be loaded dynamically into network nodes. The code can perform tasks specific to a stream of packets or even individual packets. This makes application-specific processing possible. In the context of media delivery, an active network can provide the following benefits: – the network can react to congestion using more sophisticated traffic editing than simply dropping packets at routers; – rate-based congestion control schemes can be extended by re-pacing packets at routers closer to the site of congestion until the source re-adjusts its rate; and – the congestion control scheme used can be changed according to the nature of the traffic flowing through the network. In this paper, we present the design of a system for real-time media delivery that exploits the strengths of MPEG-4 and active networks. This system is based on a best-effort transport service. It performs congestion avoidance, error concealment, and media scalability. Our design is conceptual in nature. Using MPEG-4, it is possible to drop some of the less important objects in case of congestion, and using active networks, it is possible for the application to decide which objects are less important. The rest of this paper is organized as follows. In Section 2, MPEG-4 media objects and their transmission are introduced. The features of the active network used in our system are described in Section 3. Our protocol for media delivery is presented in Section 4. Some related works are discussed in Section 5. Finally, Section 6 contains some concluding remarks.

2

Media Objects and Their Transmission

In MPEG-4, audiovisual information is organized into media objects. These objects can be of natural or synthetic origins. Video sequence and sound are examples of media of natural origins, while 2D and 3D graphics are examples of media objects of synthetic origins. An audiovisual scene in MPEG-4 consists of a hierarchy of objects, as illustrated in Figure 1 [5]. Media objects at the leaves of a hierarchy are called primary media objects. They can be classified as video objects, audio objects, still images and text. MPEG-4 provides object and content based scalability. For example, some video objects can be suppressed during media transmission while other objects, such as audio, still image and text remain in the scene of a media delivery. In addition, individual objects can be further scaled. Each media object can be represented independently of its surroundings or background. MPEG-4 also provides facilities to compose a set of objects into a scene. The necessary composition information constitutes the scene description (SD), which is coded and transmitted together with the media objects. A scenario of original media encoded into a sequence of scenes and then packetized together with their SD’s is shown in Figure 2. Note that

Protocol Design of MPEG-4 Media Delivery with Active Networks

Scence

Scence

2D background

Person

voice

Furniture

sprite

Subtiles

desk

Audiovisual presentation

globe

Primary Media Objects

Fig. 1. The logical structure of a scene

Original Media Source

Uers Control Tools

MPEG-4 Encoder System

Scene n

Scene 2

Scene i

Scene Descriptions

Primary Media Objects Audio

Video

Scence 1

2D

Text

SD

Packetizing

Packets to be sent by a network

Fig. 2. Encoding, scenes, primary media objects and their packetizing

641

642

S. Go, J.W. Wong, and Z. Wu

– SD objects are transmitted in a separate stream and provide pointers to audiovisual elementary streams; – editing the scene can be performed by changing the SD stream; and – full SD is transmitted periodically and SD updates are sent when there is a change.

3

Active Network

In this section, we describe the features of the active network used in our system. Each packet in the active network contains a program. The network allows any user to inject program-carrying packets. The language used to write a program has a primitive remEval for performing remote evaluation. The call remEval(i,n) causes the procedure invocation i to take place at node n. The node n does not have to be a neighboring node. An example of such an active network is PLAN [7]. The primitive remEval can be unreliable since the packet containing the procedure invocation i may be dropped before it reaches n. We therefore assume that there is another primitive relRemEval for remote evaluation that is reliable. Presumably, executing relRemEval is more costly than executing remEval. Thus, we use relRemEval only for important packets (such as the initial set-up packet - see subsection 4.3 below). The router programming interface is similar to that in PLAN [7]. The key primitives are described below. In our description, we use current node to mean the node at which the packet resides (or the node at which the primitive is called). – thisNode: returns the address of the current node. – routeLookUp(n): returns the neighboring node that one should go to in order to reach the node n. – getCurrentTime: returns the current time. – transRate(n): returns the available bandwidth from the current node to the neighboring node n. – deliver(d,p): delivers the data d to the process p. This primitive is available only on end systems. – previousNode: returns the previous node from which the packet containing the call arrived.

4 4.1

Protocol for Media Delivery System Overview

We now describe our protocol for media delivery. The basic operation is the delivery of media data from a server to a client. The data stream is assumed to be routed over a fixed path. This is illustrated in Figure 3 where N1 , N2 , ...Nn are nodes along the path from server to client. Our system is adaptive in the

Protocol Design of MPEG-4 Media Delivery with Active Networks

643

sense that the quality of the scenes transmitted is adjusted according to network conditions. Specifically, each node along the path estimates the capacity available at the outgoing channel. This information is reported to the server using the relRemEval primitive. The server therefore has a picture of the available bandwidth end-to-end, and the scene description can be modified according to the bandwidth available. Furthermore, during the transmission of scene data, if a node observes congestion at its outgoing channel, it may request the previous node to edit the scene description cached at that node such that the data rate is reduced. Finally, if a node observes an increase in the available capacity downstream, it can report this information to the server. The server then has a more up-to-date picture of the available bandwidth end-to-end, and may transmit a modified scene description to take advantage of the increased bandwidth.

server

N1

N2

Nn

client

Fig. 3. Transmission of media objects

4.2

Packet Types

There are five types of packets in our system. They differ in the programs they carry. These programs implement our protocol for media delivery. Note that a scene description (SD) or a scene object may be transmitted in two or more packets. Also, we use “session” to mean a given delivery of media data from beginning to end. The packet types are as follows: – Set-up packet: the first packet of a new session. – Non-terminal SD packet: part of an SD, but not the last packet of that SD. – Terminal SD packet: part of an SD and is also the last packet of that SD. – Scene packet: part of a scene. – Reset packet: indicates the end of session. Each node along the path from the server to the client keeps track of a number of variables and arrays. These variables and arrays are allocated by the Set-up packet, read and written by subsequent packets, and released by the Reset packet. They are listed below. – nextNode: records the next node in the path. – prevNode: records the previous node in the path. – scenePcktNum: records the number assigned to the Scene packet that has most recently arrived at the node. – nScenePckts: keeps track of the number of packets of the current scene that have arrived at the node.

644

S. Go, J.W. Wong, and Z. Wu

– startTime: records the time at which the first packet of a scene arrived at the node. – X: keeps track of the currently available bandwidth to the next node for this session. It is updated by the last packet of every scene. – sdCache: an array used to store the SD of the current scene. It is edited when there is a need to change the transmission rate. A scene packet reads the information in this array to determine whether it should drop itself. – sceneCache: an array used to store the packets of a scene. It is used for error concealment. – sceneSize: records the size of the current scene. In addition, the server process has a global data rate vector G = [X1 , ...Xn ] that keeps track of the bandwidth currently available to the session at each hop towards the client. In the following subsections, we give a brief description of programs contained in each of the five types of packets. 4.3

Set-Up Packet

This is the first packet sent by the server. The program contained in this packet is responsible for initializing the path from the server to the client. More specifically, when the program is executed at a node, the variables and arrays described above are created and initialized. The routeLookUp primitive is next used to determine the next node along the path to the client. The relRemEval primitive is then used to report to the server the available bandwidth to this next node. This will initialize the corresponding element of G. Finally, the relRemEval primitive is used to propagates the packet to the next node towards the client. When the Set-up packet reaches the client, the appropriate variables and arrays will have been created and initialized at all nodes along the path, and the G at the server will have been initialized with the available bandwidth at every hop. 4.4

Non-terminal SD Packet

The Non-terminal SD packet carries scene description data. If the current node is the client, the deliver primitive is used to deliver the payload to the client, otherwise a copy of the payload is entered into a local cache sdCache. The relRemEval primitive is then used to propagates the packet to the next node towards the client. 4.5

Terminal SD Packet

The program contained in a Terminal SD packet is the same as that in a nonterminal SD packet, except that it also sets sceneSize to the size of the scene described by the SD.

Protocol Design of MPEG-4 Media Delivery with Active Networks

4.6

645

Scene Packet

The Scene packet carries media object data. If the packet is at the client, the payload is simply delivered to the client using the deliver primitive. On the other hand, if the packet is at an intermediate node, one must take into consideration that some packets in a scene may be missing. The missing packets can be explained as follows. As part of the adaptation scheme, a node may have edited the scene description stored in its local cache to reflect a reduced bandwidth downstream (this scheme is described below). Some packets may be dropped by this node according to the modified scene description. The next node may therefore find that some packets belong to a scene are missing. When the program in the Scene packet is executed, a copy of the payload is entered into a local cache sceneCache. The packets that may need to be propagated to the next node are determined next. These include the current packet and any missing packets since the last packet propagated (the number assigned to this packet can be found in scenePcktNum). For each of these packets, the scene description in the local cache sdCache is checked to determine whether the packet should be dropped or not. If not, the relRemEval primitive is used to propagate the packet to the next node. For any missing packet, the copy stored at sceneCache is propagated. Note that this cached copy is a good approximation of the corresponding packet in the current scene, and substituting a missing packet by that from the previous scene is how we do error concealment. The program contained in a Scene packet also implements our adaptation scheme. Specifically, if the Scene packet is the first of a scene, then the variable startTime is initialized to the current time as seen by this first packet. If the Scene packet is the last one of a scene, then a new value of X, the available bandwidth to the next node downstream, is calculated. This new value is given by Xnew =

K T − startT ime

(1)

where K is the number of bits in the current scene that were transmitted downstream and T is the current time as seen by the last packet of a scene. The relRemEval primitive is then used to report this new value to the server. As part of the adaptation scheme, the state of the outgoing channel is checked to see whether overflow or underflow is about to occur. This can be based on parameters such as the length of the input queues, the length of the output queues, the difference between the new value and the old value of X, or some combination of these quantities. If it is determined that an overflow is about to occur, then a packet serving as an explicit congestion notification is evaluated at the previous node using the relRemEval primitive. This packet takes a parameter which is the rate at which the previous node should reduce its transmission rate to. The transmission rate is reduced by invoking a media editor which edits the scene description stored in sdCache. The details of the media editor is out of the scope of this paper.

646

S. Go, J.W. Wong, and Z. Wu

On the other hand, if it is determined that underflow is about to occur, then a packet is sent to the server. This packet takes a parameter which is the new rate the outgoing channel is able to support. This rate may be different from Xnew. The server will then try to scale up the quality of the media since there is now more bandwidth available. More specifically, the server compares the new rate with the entries in the global data rate vector G. If the new rate is lower than every other entry in G, then the server will scale up the media to this new rate, otherwise the request to scale up is ignored. 4.7

Reset Packet

This is the last packet of a session. All variables and arrays at intermediate routers related to the session are released. Cached copies of the scene description and scene data are removed as well.

5

Related Work

Among the related works are those by Najafi and Leon-Garcia [8], and by Bhattacharjee, et al. [9]. In [8], the concept of “active video” is introduced. This concept is based on MPEG-4 and active network techniques. A number of advantages of the active video over existing solutions for video distribution over the Internet are discussed. In [9], simulations were performed to demonstrate that network-based adaptation could yield significant performance gains for multicasting MPEG-1 or MPEG-2 video distribution.

6

Conclusion

In this paper, we have described a protocol for delivering MPEG-4 real-time media. The protocol takes advantage of both the programmability of active networks and the content scalability of MPEG-4 encoding. The programmability of an active network gives more flexibility to the protocol designer/application developer. For example, different applications can use different criteria for determining whether congestion is about to occur. All these variants of the protocol can co-exist in the same network, and so there is no need to standardize on any one particular variant. On the other hand, the content scalability of MPEG-4 encoding makes it possible for an application to drop packets based on content, rather than just uniformly degrading the quality of, say the video component. This makes it possible for an application to drop entirely the objects that are deemed to be less important, without affecting the quality of the other objects. Since only an application can decide which objects are important, an active network is an attractive platform for an application developer to design a variant of the protocol that is specifically tailored to the application.

Protocol Design of MPEG-4 Media Delivery with Active Networks

647

Acknowledgement This work was supported by a grant from the Canadian Institute for Telecommunications Research under the National Centre of Excellence Program of the Government of Canada.

References 1. L. Zhang, S. Deering, D. Estrin, S. Shenker and D. Zappala, “RSVP: A New ReSerVation Protocol”, IEEE Network, September 1993. 2. S. Blake, D. Black, Carlson, E. Davies, Z. Wang and W. Weiss, “An architecture for differentiated service”, Internet RFC 2475, December 1998. 3. X. Li, M. Ammar and S. Paul, “Layered video multicast with retransmission (LVMR): Evaluation of hierarchical rate control”, Proc. IEEE INFOCOM, March 1998. 4. W. Feng, M. Liu, B. Krishnaswami, and A. Prabhudev, “A priority based technique for the best-effort delivery of stored video”, Proc. Multimedia Computing and Networking, January 1999. 5. ISO/IEC JTC1/SC29/WG11 N2725, Coding of Moving Pictures and Audio, “Overview of the MPEG-4 Standard”, Seoul, South Korea, March 1999. 6. D.L. Tennenhouse, J.M. Smith, W.D. Sincoskie, D.J. Wethrall and G.J. Minden, “A Survey of active network research”, IEEE Communications Magazine, vol. 35, no. 1, Jan. 1997. 7. M. Hicks, J.T. Moore, D.S. Alexander, C.A. Gunter and S.M. Nettles, “PLANet: An Active Internetwork”, Proc. IEEE INFOCOM, 1999. 8. K. Najafi and A. Leon-Garcia, “Active Video: A Novel Approach to Video Distribution” Proc. Second IFIP/IEEE int. Conference on Management of Multimedia Networks and Services, Paris, France, November 1998. 9. S. Bhattacharjee, K. L. Calvert, and E. W. Zegura, “Network support for multimedia video distribution”, Technical Report CIT-CC-98-16, College of Computing, Georgia Institute of Technology, 1998.

Prediction and Control of Short-Term Congestion in ATM Networks Using Artificial Intelligence Techniques Guiomar Corral, Agustín Zaballos, Joan Camps, and Josep M. Garrell Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Passeig Bonanova 8, 08022 Barcelona, Spain {guiomar, zaballos, joanc, josepmg}@salleURL.edu

Abstract. Nowadays high-speed transmissions and heterogeneous traffic are some of the most essential requirements that a communication network must satisfy. Therefore, the design and management of such networks must consider these requirements. Network congestion is a very important point that must be taken into consideration when a management system is designed. ATM networks support different types of services and this fact makes them less predictable networks. Congestion can be defined as a state of network elements in which the network cannot guarantee the established connections the negotiated QoS. This paper proposes a system to reduce short-term congestion in ATM networks. This system uses Artificial Intelligence techniques to predict future states of network congestion in order to take less drastic measures in advance.

1 Introduction The design, configuration and management of real communication networks are phases that must be taken into account in order to achieve network performance objectives. These objectives include high-rate transmissions and heterogeneous traffic. Asynchronous Transfer Mode (ATM) networks can fulfill these requirements with very high rates and different types of services. On the other hand, they are less predictable networks [1] than other networks that only support one type of service. The reason for this is that trusted statistics from traffic characteristics and connection establishment patterns aren’t given. ATM networks also guarantee the engaged Quality of Service (QoS), so when a connection is accepted, the network must fulfill all the agreements reached with the user. But due to the statistical multiplexing of the traffic, an inherent feature of ATM, it is possible to have congestion even though all connections carry out their contracts. ATM congestion can be defined as a state of network elements in which the network is not able to guarantee the negotiated Network Performance objectives for the already established connections [2]. Congestion can be caused by unpredictable statistical fluctuations of traffic flows or fault conditions within the network [2]. Since an ATM network supports a large number of bursty traffic sources, statistical multiplexing can be used to gain bandwidth efficiency, allowing more traffic sources to share the bandwidth. But if a large number of traffic sources become active simultaneously, severe network congestion can result [3]. P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 648–657, 2001 © Springer-Verlag Berlin Heidelberg 2001

Prediction and Control of Short-Term Congestion in ATM Networks

649

Two different types of congestion, long-term congestion and short-term congestion, can be distinguished. The former takes place when network load overcomes network resources and can be avoided with an accurate network resource planning and preventive controls like Call Admission Control (CAC). The latter lasts less than the round-trip delay and it is difficult to foresee because of dynamic variations of cell interarrival times due to bursty traffic sources. However, contention techniques could minimize its consequences [4]. This paper proposes a system to reduce short-term congestion in ATM networks. This system uses Artificial Intelligence (AI) techniques to predict future states of network congestion. An existing buffer control algorithm [4] is used. Using historical data files and AI techniques, a synthetic-generated mathematical function (a model) is created. This model is used to generate several input parameters of the buffer control algorithm in order to adapt its behavior to the situation. Results show that the system improves network performance. 1 This paper is divided into five sections as follows. The first section introduces and locates the problem that is going to be solved. The second section focuses on the congestion concept with congestion control schemes. The third section describes the implemented solution, which predicts short-term congestion using AI techniques. In the fourth and fifth sections, the simulation environment and results are given. Finally, results, conclusions and further work are presented.

2 Problem Analysis Congestion occurs when network performance falls off dramatically [5]. Moreover, in ATM networks, congestion is defined as the network state in which the necessary resources to provide the QoS contracted by the users are not available [2]. This QoS, which must be assured, is negotiated in the connection establishment [2]. Monitoring ATM networks performance for traffic and congestion control purposes leads to difficulty because there are some parameters whose values must be tuned. These parameters are not only based on users’ traffic descriptors but also on the different traffic control policies implemented [6]. Congestion control schemes can be classified depending on the congestion duration. The longer the congestion duration, the wider the perspective that will be used to control it. Some of the control mechanisms, arranged in order of congestion duration, are the following: network design, Connection Admission Control (CAC), routing, traffic shaping, end-to-end feedback, hop-by-hop control and buffering. CAC is used during the call set-up phase to determine whether a connection can be accepted or rejected. A new connection request in an ATM network must contain traffic descriptor parameters that CAC uses to determine whether the connection may be established. By accepting the connection, the network forms a traffic contract with the user. Later on, Usage Parameter Control (UPC) will monitor the connection to determine whether the traffic conforms to the traffic contract [5] [6]. Priority control is useful when end-systems can generate different priority traffic flows using the Cell Loss Priority (CLP) bit of the ATM cell header [7]. Then, the 1

This work is included in a research project partially supported by Spanish research program (CICYT TEL98-0408).

650

G. Corral et al.

network may selectively discard cells with low priority, if necessary, in order to protect network performance for high priority cells. Traffic shaping is a mechanism that alters cell stream traffic characteristics to ensure its conformance, whereas feedback is used to regulate the traffic submitted according to the network’s state. Different performance parameters can be used to monitor ATM QoS, like Cell Loss Rate (CLR), Cell Misinsertion Rate, Cell Error Ratio, Cell Transfer delay (CTD), Cell Delay Variation and so on [2]. But the most important parameters related to congestion are CLR and CTD. However, since speeding up the ATM switching highway and the transmission link can satisfy CTD requirements, only CLR will be used [4]. [4] proposes a priority control for cell loss quality that attempts to tolerate shortterm congestion situations at the expense of the source's low-priority traffic, which has the least restrictive traffic descriptors. In fact, this mechanism could be classified as a Partial Buffer Sharing policy with a priority control. Generally, a Partial Buffer Sharing policy, in contrast to Complete Buffer Partitioning policy, drops an incoming cell only if the total number of cells in the buffer exceeds a given threshold [8]. This means that a cell is only discarded if there is not enough free space in the buffer.

Fig. 1. A Partial Buffer Sharing Policy with three defined thresholds

It is very important to focus on the pursued goal, which consists of discarding the minimum cells whose CLP field is disabled by UPC. Congestion would cause the cells that had been previously accepted by UPC to be discarded, and this is what must be avoided. In the end, the cells tagged as nonconforming cells are those that must be dropped first if congestion occurs. If the system discards cells with enabled CLP field before a heavy congestion situation happens, the amount of discarded cells with enabled CLP could be minimized. Therefore, accurate thresholds should be computed. Then, when the utilization thresholds are exceeded, low-priority cells are discarded. But these thresholds are static values, not dynamic. Thus, they cannot adapt to different network situations. Our proposal improves threshold selection by using AI techniques to predict a future short-term congestion based on the temporary evolution of the buffer utilization.

3 Short-Term Congestion Prediction Using AI Techniques In order to predict short-term congestion in a network, AI techniques have been implemented. First of all, the prediction goal and input data must be explained. Then, the AI technique will be introduced, focusing on its application in our problem.

Prediction and Control of Short-Term Congestion in ATM Networks

651

3.1 Prediction Goal and Input Data The system should predict when a short-congestion situation is going to happen. If this moment is foreseen before it happens, some measures can be taken in advance to avoid this future and undesirable situation. The system can predict it, using information based on the temporary evolution of the buffer utilization. AI techniques learn from past situations and apply their knowledge to predict new situations. The AI technique used is Genetic Programming (GP) [9]. GPs are a machine learning method useful for prediction model generation. In this case, it will predict the future buffer utilization. Like the majority of machine learning methods, GPs need a representative set of problem samples to be trained. Once the training phase is completed, the output (the model) is used to make the prediction. The test bed used to train our GP is made up of a set of samples, where every set of samples is included in a file. These samples come from previous network simulations. Thus a file contains a time-ordered list of buffer utilization states. The GP system needs a data set that reflects not only the past and present situation, but also the future buffer utilization, in order to achieve a good training. Therefore, the data set will be fragmented in windows and every window will be processed as a new sample. Every window includes an account of buffer utilization in the previous instants as well as the future buffer utilization. The account is summarized in intervals and every interval is represented by the maximum, the minimum and the mean buffer utilization. We must consider that there are different traffic sources and they can generate traffic of different priorities. So the intervals will contain the utilization percentage for every priority. On the other hand, the future interval buffer utilization will only be represented by the utilization mean. Future buffer utilization will be the predicted value. Consequently, a file containing buffer utilizations for every traffic priority in a period of time will be given to GP. B u ffe r u tiliza tio n

MI S am p les

MI S am p les

MI S am p les

MI S am p les

D IP S am ples

IP S am ples M ean P rediction

t

N I W ind ow s

Fig. 2. Example of a window and how it is fragmented in different intervals. The graph illustrates the buffer utilization along simulation time. MI samples correspond to the samples of a measurement interval (MI). Some MI samples will be used to predict the future utilization of a prediction interval (IP). The distance between MI samples and IP is DIP (Prediction Interval Distance). 3.2 Genetic Programming Approach As stated before, Genetic Programming [9] has been chosen to predict ATM node queue utilization. This is an AI technique related to evolutionary computation, which

652

G. Corral et al.

is inspired by Charles Darwin’s theories on evolution and by Gregor Mendel’s genetic inheritance, where the existence of a population is simulated and it evolves as time goes by. The basic GP algorithm imitates nature simulating a population of individuals that clone, recombine with others or disappear. The better-adapted individuals to the environment are those that have more possibilities of survival and become progenitors of the new generations of individuals. The population spreads toward a group of better individuals, due to these transformations and to natural selection. The population's global tendency will maintain and replicate the important information, while it will lose the less representative one. In evolutionary computation, the environment is the outlined problem that wants to be solved. Likewise, each one of the population's individuals is a potential solution. The better the solution, the more possibilities it has to survive from one generation to another. GP considers that each individual is a program that can solve the outlined problem. Thus the population is considered as a group of programs that will be possible solutions. From one generation to another, these programs will be cloned, crossed and mutated. Among all the programs, only the selected ones will be used. This selection depends on the fitness of each program, on the similitude between the desired solution and the obtained solution for each program. In the end, a group of sufficiently good programs is obtained and one of those is chosen, usually the best one. Symbolic regression has been the strategy used to obtain a GP prediction model, so specific formulas that solve the proposed problem can be obtained. Then, a formula will be used to predict the mean utilization of an ATM node queue. With symbolic regression, the population's individuals are reduced to formulas. The fitness population formula is evaluated according to the prediction success. The formulas that achieve a more accurate prediction of the prospective utilization will have more probability of persisting. The obtained formulas that predict mean buffer utilization after DIP contain some of the parameters listed in Table 1. These parameters must be calculated using the history of buffer utilization. One example of a formula is the following: Future Mean Buffer Utilization = ( P3 / P13 ) – P8 + P16 + P17

(1)

Table 1. List of parameters that can appear in the GP prediction model

Historical Window 1 Window 2 Window 3 Window 4

Maximum value P1 P6 P11 P16

Minimum value P2 P7 P12 P17

Mean P3 P8 P13 P18

%Low priority P4 P9 P14 P19

%High priority P5 P10 P15 P20

4 Simulation Test-Bed The AI algorithm will predict congestion situations based on the buffer utilization; thus, a mechanism that works closely with the buffer should be chosen. [4] is a UPC

Prediction and Control of Short-Term Congestion in ATM Networks

653

mechanism that monitors the traffic behavior generated by the user's sources and follows a performance policy. To determine the performance of the new proposal a simulation environment in Mil3 OPNET has been programmed. The scenarios and test-bed implemented are explained in this section. 4.1 Simulation The Mil3 OPNET simulator has been used to analyze the improvements introduced by the AI implementation. Firstly, a control congestion environment without AI was programmed. Any network node will detect the congestion situation monitoring its buffer utilization. Depending on previously defined thresholds, [4] always eliminates fewer high-priority cells than low-priority cells. Different simulation scenarios are implemented with different types of sources and different traffic loads. Thresholds, which have been calculated previously, will determine a CLR for each traffic type. Later, this environment was adapted using AI to control the congestion. Opnet simulator uses nodes to carry out the different functions. Figure 3 shows the node design which implements [4].

Fig. 3. Node design

An Opnet node is composed of several processes. The processes that form the control congestion node are the following: • Generador_High and Generador_Low: these processes generate ATM traffic following almost any probabilistic or bursty distribution. The first one produces high priority traffic and the second one generates low priority traffic. • Marker_Low and Marker_High: As the generated cells by OPNET sources do not tag any CLP field cell and the algorithm works closely with the UPC techniques, it was necessary to program this process. Its main function is the implementation of a Jumping Window algorithm [10]. • Cola: This is a programmable FIFO buffer queue of an ATM device. • Rendimiento: This process is used to centralize link performance statistics. • Sumidero: This is the cell sink that avoids the collapse of the simulation system. • Eliminador: It implements [4]. The Finite State Machine is represented in figure 4.

654

G. Corral et al.

Fig. 4.State Machine of ‘Eliminador’ Node

The ‘Eliminador’ process had to be modified in order to adapt the system to the use of AI information. This calculates the estimated buffer utilization using the obtained prediction model and carries out an appropriate threshold policy. Depending on the prediction, thresholds will be more or less restrictive, that is to say, the node will drop cells sooner or later. The instant when the node starts dropping cells is fixed according to the buffer length and threshold policies. These thresholds are X1, X2 and X3. When buffer length overcomes X2, any cell with enabled CLP is discarded. If, far from improving, the congestion level increases, even overcoming X3, the system will discard low-priority cells with disabled CLP. X1 is used to implement a hysteresis cycle avoiding oscillation. MAX_BUFFER Buffer Length

X3

X3

X3

X2 X1

X2 X2 X1 X1 Threshold Policies

Fig. 5. Threshold policies applied to the buffer. 4.2 Traffic Sources In order to evaluate the implemented model in an exhaustive way, the maximum number of possible scenarios should be simulated. So different source types are used in every simulation allowing us to study a high number of real cases. Persistent, stochastic and bursty sources have been implemented in our simulations. A persistent source uses a constant distribution and data generation speed is constant. On the other hand, stochastic sources transmit depending on a certain probability distribution. In our case, exponential and normal distribution stochastic sources have been used. Bursty sources are characterized by an on-off behaviour because they alternate between active and idle periods. On-off models have been usually adopted in order to simulate real traffic sources [11]. In active periods, cells are generated at a peak bit rate, whereas in idle periods no cells are generated.

Prediction and Control of Short-Term Congestion in ATM Networks

655

5 Results After the implementation of both models in OPNET, a qualitative comparison can be performed. Thus, a measurement to evaluate both models is needed. The chosen measurement has been the number of high-priority and low-priority cells discarded by both algorithms. As in previous simulations, both algorithms fulfil initial specifications, that is to say, the number of low priority cells dropped are bigger than the number of high priority cells. After the simulation of both algorithms using different traffic sources (exponential, normal and bursty ones) and varying the network load, obtained results are all similar in appearance to Figure 6:

Fig. 6. The upper figure shows dropped low priority cells and the lower figure shows dropped high priority cells. One trace of each figure shows original algorithm results and the other one shows modified algorithm results.

Fig. 7. The upper figure shows dropped low priority cells and the lower figure shows dropped high priority cells. One trace of each figure shows original algorithm results and the other one shows modified algorithm results.

Figure 6 shows that, in heavy load situations, our proposal eliminates fewer cells than the other one. However, in poor load situations, the original algorithm drops a barely noticeable number of cells than the modified ones. Previous simulations analyzed all discarded cells. Now, if only CLP0 discarded cells are taken into account, similar results are obtained. These results are shown in figure 7.

656

G. Corral et al.

Fig. 8. This figure enlarges Figure 7. It focuses on the point where our algorithm improves the original one. From this point, the enhanced algorithm eliminates a smaller number of cells than the first one [4]

6 Conclusions and Further Work To predict and control short-term congestion in ATM networks, a control method using Artificial Intelligence techniques has been introduced in this paper. After an exhaustive analysis over previous papers, a UPC algorithm that works with buffer utilization has been chosen. This algorithm has been adapted in order to improve the congestion control. The prediction of the future buffer utilization is the main goal of the new algorithm. This prediction will be obtained from the results of a formula given by AI. Using the account of buffer utilization and AI techniques, this mathematical function is created. The new algorithm uses this formula in order to foresee future states of network congestion. Then, it will apply this new knowledge with the purpose of minimizing the congestion effects. Another goal has focused on obtaining a qualitative evaluation of AI application in ATM networks congestion control. Furthermore, it was important to determine its viability and effectiveness. Finally, it has been proved that AI contributes, in general, to the improvement of the mechanism capabilities in which it is applied. It is important to find out which of the processes used to control ATM congestion are likely to be improved by AI. In our concrete application case, the AI learning process could be improved using other techniques of evolutionary computation or increasing or reducing distance prediction. It could be interesting to analyse how different threshold policies could change algorithm performance. Then, it might be possible to obtain a concrete AI model that will improve the behavior of short-term congestion control whatever the real traffic pattern was. To improve AI application advantages, several questions regarding this work still exist. These questions include the AI application formula, the methodology used to obtain this prediction formula, the utilization of different traffic sources and the threshold policy used. If, for example, threshold policy is modified to exclusively use more restrictive thresholds than the reference ones and never less restrictive thresholds, a new algorithm could be obtained. This new algorithm would eliminate a smaller number of cells than the original algorithm whatever the traffic load and whatever the traffic sources. All these points remain a subject to be studied.

Prediction and Control of Short-Term Congestion in ATM Networks

657

Acknowledgements We would like to thank the Comisión Interministerial de Ciencia y Tecnología for its support under grant number CICYT/Tel1998-0408-02. The results of this work were obtained using the equipment co-funded by the Direcció General de Recerca de la Generalitat de Catalunya (D.O.G.C. 30/12/1997). We would also like to thank Enginyeria i Arquitectura La Salle (EALS), Universitat Ramon Llull for their support to our research group.

References 1. M. de Prycker: Asynchronous Transfer Mode, solutions for Broadband ISDN, 2nd edn. Ellis Horwood, ISBN 0-13-178542-7 2. The ATM Forum: ATM User-Network Interface (UNI) Signalling Specification, Version 3.1, p. 69, September 1994. 3. Salim Hariri and Bei Lu: ATM-Based Parallel and Distributed Computing, 1996 4. S.Abe, T.Soumiya: A traffic Control Method for Service Quality Assurance in ATM Networks, IEEE Journal on Selected Areas in Communications Vol. 12, n.2, February 1994 th 5. William Stallings: Data & Computer Communitacions, 6 . ed., Prentice Hall, June 2000 6. D. Gaïti and G. Pujolle: Performance Management Issues in ATM Networks: Traffic and Congestion Control, IEEE Transactions on Networking, vol. 4, n.2, April 1996 7. Ramesh, Rosenberg and Kumar: Revenue Maximization in ATM Networks Using the CLP Capability and Buffer Priority Management, IEEE/ACM Transactions on Networking, Vo. 4, N.6, December 1996 8. Norio Matsufuru and Reiji Aibara: Flexible QoS Using Partial Buffer Sharing with UPC, IEICE Trans. Commun. Vol . E83-B, N.2, February 2000 9. John R. Koza: Genetic Programming, 6th Printing, Massachusetts Institute of Technology, ISBN 0-262-11170-5 10. Hilde Hemmer and Per Thomas Huth: Evaluation of Policing Functions in ATM Networks, Elsevier Science Publishers B.V., 1991 11. Tsern-Huei Lee, Kuen-Chu Lai: Design of a Real-Time Call Admission Controller for ATM Networks, IEEE/ACM Transactions on Networking, vol. 4, N.5, October 1996

Monitoring the Quality of Service on an ATM Network Carrying MMB Traffic Using Weighted Significance Data A. Abdul Karim Mouharam and M.J. Tunnicliffe School of Computer Science and Information Systems, Kingston University, Kingston-Upon-Thames, KT1 2EE, U.K., Tel.0044 (208) 5472000 ext. 2674 Fax: 0044 (208)5477824 [email protected]

Abstract. Recent years have shown a great change in the telecommunication environment. Thus far, separated voice and data networks are being replaced by heterogeneous networks capable of supporting a diverse variety of traffic. Quality of Service (QoS) has become an important factor in the deployment of the next-generation of data networks. The continuing increase in the volumes of data to be carried by ATM networks has boosted the need to administrate the QoS. Although the Connection Admission Control (CAC) algorithm is not specified by the ITU-T, it is still widely used to moderate bandwidth allocation and User Parameter Control (UPC) algorithms can ensure that contractual stipulations are met. However, if an accurate QoS monitoring technique is implemented, both the CAC and UPC mechanisms will have a firmer foundation upon which to base their decisions. This will mean a firmer control on the bandwidth allocation. This paper focuses on the use of data interpretation to monitor the QoS of source bursty traffic based upon delay.

1

Introduction

Network bandwidth is being consumed by hungry applications like Internet telephony, video conferencing and video on demand. The proliferation of personal computers, together with the increased use of local area networks has caused an increase in traffic which had a severe impact upon the network QoS. This Explains the growth of the data communications market at an estimated 30% per annum [1], while the bandwidth representing data (as opposed to voice) traffic has expanded from 25% to over 61% in the years 1995-8. Figure 1 demonstrates the increase of data bandwidth relative to voice bandwidth. The fact is that many networking applications like the World Wide Web, Internet Telephony, Desktop Video Conferencing and Video-on-Demand have produced an increased demand for bandwidth, together with the support of heterogeneous services on a single network. Asynchronous Transfer Mode (ATM) is one of these broadband networks which has been deployed to cope with the increasing demand on bandwidth. Recommendations for its use in the implementation of a broadband digital service has been made by the International Telecommunication Union (ITU-T) and the American National Standard Institute (ANSI). Therefor it has been recognized as the future communication P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 658–667, 2001 © Springer-Verlag Berlin Heidelberg 2001

Monitoring the Quality of Service on an ATM Network Carrying MMB Traffic

659

network. ATM is based on switching small, fixed size packets called cells (53 bytes each) using a connection oriented protocol. When an ATM contract is being established between the user and the network Administrator, the user than can establish a virtual connection (VC) for the user cells to travel from source to the destination. A number of these VCs created in parallel it is referred to as Virtual Path (VP). The small size cells will guarantee a faster transmission rate. It is capable of carrying video, voice, multimedia and other data services through a single network. While the dominant Available Bit Rate (ABR) services can - if necessary - tolerate large delays, they are highly vulnerable to data loss. Their connection contracts therefore specify a minimum cell rate MCR [2]. However, for the purposes of realtime applications (voice, video etc.) cell delay and cell-delay variation should also be kept to minimum. These demands on the data network bandwidth have produced an increasing need to monitor the quality of service (QoS) provided. Data networks need to be monitored in order to allow network managers to keep up-to-date with new applications and their demand for bandwidth. As described in the following section, the monitoring of QoS will involve a continuous collection of data and interpretation of this data to detect intermittent error conditions, together with any trouble resulting from a gradual deterioration of the network. This allows network operators to take precise action if deterioration in the QoS is discerned. 80 60 % Of Rise 40 20 Data Voice

0

1985

1995

over 1995

Year Fig. 1. Date traffic increase relative to voice traffic (after Atkins [1])

This paper reports on research aimed to establish a better method of monitoring the QoS of an ATM network without having to check every cell transmitted. This can be achieved by using additional monitor cells to detect the current state of the network. QoS in terms of delay is monitored since cell loss in a real ATM network is extremely low. (It is estimated that Cell Loss probability in a real ATM network is -9 close to 10 [3]). In view of the inaccessibility of "real" network data, the integrity of a monitoring strategy must be verified by a computer simulation. For this purpose, a simulation program was written in C++. A multi-state Markov-modulated Bernoulli traffic streams has been monitored in the presence of heterogeneous MPEG crosstraffic.

660

2

A.A.K. Mouharam and M.J. Tunnicliffe

ATM (QoS)

QoS monitoring in ATM networks will guarantee the user that there is no disturbance of the bandwidth/QoS agreed in the traffic contract. ATM covers important features of networking like QoS, statistical multiplexing and traffic loss prioritization. In ATM, QoS may be quantified by several parameters, most notably the cell-loss probability (CLP), the cell transfer delay and cell delay variation (CDV). 2.1

Operation and Maintenance Cell (OAM)

The ITU-T recommendation 1.610, define a cell with a special format called the Operation and Maintenance Cell (OAM). There are 2 types of OAM cells in the ATM layer and they are as follows: 1. Virtual Path Level, called F4 [4]. This provides an end-to-end flow from one endpoint at the same level to another end-point. 2. Virtual Channel Level, called F5 [4]. This provides a segment flow, which is a concatenation of virtual path or virtual channels link from one point to another connection point, i.e. switch-to-switch. OAM cells can be used for fault management or performance management. In this paper we are focusing on using OAM cells for performance management in the specific field of monitoring. The following scenario will illustrate the use of OAM cells: Suppose we have two end-points A and B. OAM cells will flow in each direction, A to B and B to A. In a real ATM network, launching an OAM cell will involve injecting the cell into the path, counting previous user cells and calculating the 16-bit parity on the transmission side. Normally OAM cell flow may have different block sizes, i.e. OAM cell when traveling from point A to B may be injected for every 100 cells, and when traveling from B to A can be injected for every 200 user cell. Performance Monitoring OAM cells will detect the following important ATM QoS parameters. 1. Cell Loss Ratio (CLR). A cell loss usually occurs when a cell arrives at a switch buffer which is already full to capacity. Since there is no available memory space to store the cell, it is discarded and lost. CLR in this case, can be represented in the simulation. (Cell loss may also be caused by system noise or by a component failure.) 2. Maximum Cell Transfer Delay (MaxCTD), This is the maximum elapsed time between the launching of a cell onto the network and its arrival at the destination node. It is therefore the sum of the delays of all the individual links in the path. 3. Cell Delay Variation (CDV), This is the difference between the maximum and minimum cell transfer delays. It is a particularly important parameter in real-time services such as video. These parameters can then be used to analyze the QoS of the network.

Monitoring the Quality of Service on an ATM Network Carrying MMB Traffic

2.2

661

Connection Admission Control (CAC)

When a user negotiates a traffic contract with the network management system to setup a virtual connection between a source and a destination, a number of traffic descriptors will need to be set (e.g. Peak Cell Rate, Sustainable Cell Rate). Every CAC of a node of the requested VP connection needs to agree with the contract, Otherwise it will reduce the values in the traffic descriptors. Therefore the duties of the CAC of the switch can be summarized as the intelligent determination of a suitable traffic model to match the traffic descriptors. Once a suitable traffic model is found then it is combined with a complex queuing model to determine whether the system has enough resources to abide by the contract. If the resources are found to be enough then bandwidth is allocated to this contract. ATM network efficiency depends on the CAC and when admitting a new connection. The CAC algorithm is still being researched in order to improve the bandwidth allocation efficiency [5]. It is worth mentioning that CAC algorithms are not specified by the ITU-T. Since the bandwidth allocated in the contract can be exceeded by the user (causing a decrease in the QoS of other users) a Usage Parameter Control (UPC) mechanism has been introduced. This mechanism carries out a policing role for the network, to make sure that users do not exceed what they have been granted in the contract.

3

Network Model

This section describes the network model that has been implemented. A random number generation scheme is used to introduce cell-streams into the switches. Figure 2 shows the simulated network configuration, which represents a cross-section of six ATM switches. S o urce 4

S o urce 5

S o urce 6

CH1

CH1

CH2

CH2 ATM sw itc h

CH3

ATM sw itc h

ATM sw itc h

CH3

M o nito r C ell

M o nito r C ell

S o urce 7

S in k 7 ATM sw itc h

ATM sw itc h

S in k 4

ATM sw itc h

S in k 5

S in k 6

Fig. 2. The simulated Data Network. Dotted arrow indicates the direction of travel.

Three virtual channel connections labeled CH1, CH2 and CH3 are combined to a common virtual path connection. The network cross-traffic is represented by four traffic sources labeled Source 4, 5, 6 and 7.

662

A.A.K. Mouharam and M.J. Tunnicliffe

A Multi-state Markov Modulated Bernoulli (MMB) traffic model was applied to the three virtual channel connections (CH1, CH2 and CH3). Similarly an MPEG traffic model was applied to the four cross-traffic sources. The MMB connection was monitored by an additional connection CH0, through which monitor cells were injected every 1000 ATM cycles. (Monitor cells could represent OAM cells in a real ATM network.) 3.1

Simulated MPEG Video Traffic

This represents the cross network traffic, which is the background load on the network. A high bandwidth is required to obtain an image from the receiving end, because of the large number of pixels involved. Image coding is therefore provided in order to reduce the pressure on the bandwidth. MPEG coding is based on a combination of a block based intra- and interframe techniques [6]. These techniques aim, as much as possible, to reduce the spatial correlation existing between individual pixels in the image. Bit rates can vary from zero to a maximum allowed rate, or a clear stepped variation across a range of quantified rate intensities. This source has been based on work carried out at Loughborough University [6]. It is certain that a relatively high proportion of future network traffic in local metropolitan and telecommunication networks will be of video traffic type. This video traffic would be generated by many sources like video conferencing and video telephony. Figure 3 shows a typical traffic profile generated by the simulation.

Mpeg Data Cells / 5000 cycle

1450 1350 1250 1150 0

200

400

600

800

1000

Time Of 5000 Cycle

Fig. 3. A Typical output of MPEJ traffic generated by the program.

3.2

Mulitstate Markov-Modulated Bernoulli (MMB) Traffic

The VBR traffic has been of interst to many researchers [e.g. 9], and it is been implemeted using a muliti-state traffic model. This experiment introduced two refinements: Firstly, attention was given to the fact that cell loss in a real ATM -9 network is extremely low (typically 10 )[3]. Therefore QoS monitoring was focussed on data delay rather than data loss. Figure 4 shows typical delay profiles generated by the simulation. From the diagram it can be can seen that, the maximum tolerable delay has been set to 12 in the simulation. Therefore any cell arriving beyond the time limit of 12 cycles will considered a failure.

Monitoring the Quality of Service on an ATM Network Carrying MMB Traffic

663

140000

Data Cells

120000 100000 80000

Maximum Tolerable Delay

60000 40000 20000 0 0

5

10

Delay

15

20

25

30

Fig. 4. Shows typical delay profiles generated by the simulation. The diagram represents the total number of cells dropped into the network by the monitored channel against the waiting time taken to transmit those cells The Markov chain model is an established conceptual device for describing the way in which a stochastic system’s behavior is related to its state transition probabilities. This is the traffic, which is being monitored by this program. There is no doubt that the Markov chain approach has received a wide acceptance for traffic modeling. Figure 5 shows the model used to generate MMB traffic used in these simulations. It shows that each state would have 6 possible destination states, each of which has its own cell-generation probability.

1

2

3

4

5

6

Fig. 5. Model used to generate the Markov modulated Bernoulli chain traffic.

 q11 q12 q13 q14 q15 q16  q 21 q 22 q 23 q 24 q 25 q 26    . . . . . .  Q(i, j ) =   . . . . .   .  . . . . . .    q 61 q 62 q 63 q 64 q 65 q 66

(1)

This model consists of 6 states, which is sufficient to represent quite a complex traffic source. The stochastic state transition matrix Q represents the transition probabilities from each state to every other state. This shown in Eqn. 1. For example, the element

664

A.A.K. Mouharam and M.J. Tunnicliffe

qij from Q represents the state transition from state i to state j and qii represents probability that the system would not change state. The following formulae have been used in order to ensure statistical equilibrium between states. If S is the state space of the system and P(i) is the probability that the system is in state i.

P( j ) = ∑ P(i ).qi, j

(2)

∑ P(i) = 1

(3)

i∈s

Where i∈s

The traffic profile generated by this model has been plotted in the following figure. Which clearly show the jumping between states returning different rate of generation of cells into the network.

Transmited Cells / 5000 Cycle

1600 1400 1200 1000 800 600 400 200 0 0

200

400

600

800

1000

Time Period of 5000 cycle

Fig. 6. Shows a typical traffic profile produced by this model and generated by the simulation

4

Experiment

The simulation was run for a period of 5,000,000 cycles (just over 13 seconds of realtime). All channels CH1, CH2 and CH3 in the virtual path connection were monitored to see whether the failed monitor-cell ratios were reflected in the corresponding data cells. Monitor cells were injected every 1000 cycles, and their observed failure rates were used to compute the 95% confidence interval for the failure probability [3]. The second experiment was designed to determine how many hits (i.e. failure rates within the 95% confidence interval) would be obtained when running twenty simulations at a time. In this case only one channel was monitored, and each time the simulation was run for a period of 5,000,000 cycle. Again monitor cells were injected every 1000 cycles, and their observed failure rates were used to compute the 95%

Monitoring the Quality of Service on an ATM Network Carrying MMB Traffic

665

Rate of Failure

confidence interval for the failure probability. Figure 8 shows the upper and lower confidence limit along with loss probability when running the simulation for 20 run time.

8 6 4 2 0 1

2

3

Channels

Rate of Failure

Fig. 7. shows the results generated by the simulation. It is clear that the actual failure percentages for all the three channels fall uniformly within this confidence interval. (Note that the vertical lines stretch from the upper to the lower confidence limits and the horizontal “dash” sign represents the “actual” failure probability.)

14 12 10 8 6 4 2 0 1

2

3 4

5

6

7 8

9 10 11 12 13 14 15 16 17 18 19 20

No Of Run Time

Fig. 8. Results of the experiment when running the simulation for 20 runs at a time. The actual failure percentages for the monitored channels fall most of the time within the predicted confidence intervals. (Note that the vertical lines stretch from the upper to the lower confidence limits and the horizontal “dash” sign represents the “actual” failure probability.) This result uses weighted significance algorithm.

5

Result Analyses

The Bayesian technique (which has been used to determine confidence intervals in this experiment) makes use of both subjective probability and measurement to determine the degree of belief about a value or unknown parameter. The subjective probability is called prior distribution. According to Harold [7], “…..the prior distribution of a parameter θ is a probability function or probability density function expressing our degree of belief about the value of θ , prior to observing a sample of a random variable X whose distribution function is indexed by θ.”. The posterior

666

A.A.K. Mouharam and M.J. Tunnicliffe

distribution represents the way in which this belief is modified by subsequent observation, and would be used to build an estimator of the unknown parameter. The simulation calculates the upper and lower confidence interval for the network performance parameters. The confidence interval is used to estimate that an unknown parameter (which is the rate of failure) is an interval so that: Upper limit ≤ rate of failure ≤ Lower Limit [8] where the values of the upper and lower limits depend on numerical value of the sample statistics of the network. The inaccuracy which happened in the past is believed to be a consequence of the additional load applied to the network over the high bit-rate excursions, during which a larger proportion of cells are transmitted than during quieter periods [9]. The monitor cells are injected uniformly across the time domain, and therefore form a poor representation of the source’s characteristics. Figure 9 demonstrate the inaccuracy reading from the simulation which happened in the past.

Rate of Failure

12 10 8 6 4 2 0 1

2

3

4

5

6

7

8

9 10 11 12 13 14 15 16 17 18 19 20

No of Run Time

Fig. 9. Results of the experiment when running the simulation for 20 runs at a time. The actual failure percentages for the monitored channels fall most of the time above the predicted higher confidence limit. (Note that the vertical lines stretch from the upper to the lower confidence limits and the horizontal “dash” sign represents the “actual” failure probability.) Inaccuracy when not using weighted significance.

Therefore, a system of “weighted-significance” has been applied to the data prior to the computation of the confidence limits. The way is has been implemented is explained below: Let us assume that each state i in the channel would generate Ni cells of which Ji are the successful cells received at the other end. Therefore the total number of transmitted cells would be N=N1+N2+N3+…+Ni and in the same way the total number of successfully received cells would be J= J1+J2+J3+…+Ji. Lets assume a function δ (which we can call the “significance factor” between the bit rates for each state) thus:

δn =

Nn N max_ bit _ rate

(4)

Monitoring the Quality of Service on an ATM Network Carrying MMB Traffic

667

The values of N and J would therefore be implemented like the following formulas. The value of N and J would then be fed into the simulation to calculate the upper and lower confidence interval. i

N = ∑ δ r Nr

(5)

r =1 i

J = ∑ δ r Nr

(6)

r =1

These formulas were used to modify the monitor cell data shown in Fig.8. It is clear that the rate of successful performance predictions is significantly improved.

6

Conclusions

Network bandwidth is being consumed by hungry applications like the Internet, Video conferencing and video on demand. The demand on bandwidth has produced a high need to monitor the QoS on networks. This paper focuses on establishing a better way to monitor the QoS of ATM network with out having to check every single cell transmitted. A “weighted significance” is proven to provide an accurate result and most of the time the actual failure percentages for the monitored channel fall within the predicted confidence intervals. Once the study is finalized, both CAC and UPC mechanism will have a firmer foundation upon which to base their decision.

References 1. Atkins, John.: Total area networking : ATM, IP, frame relay, and SMDS explained. nd 2 edn. Chichester. John Wiley (1999) nd 2. George Kesidis.: ATM network Performance. 2 edn. kluwer academic publishers (2000) 3. Mouharam, M. Tunnicliffe, A. J. Curley.: Monitoring Quality of Service on an ATM Network. Proc. IEE Colloquium on Control of Next Generation Networks, Savoy Place, London (1999) 4. McDysan, David E.: ATM theory and application. McGraw-Hill, New York, London(1998) 5. Natalie Giroux,Sudhakar Ganti.: Quality Of Service in ATM Networks. Prentice Hall (1998) 6. R. Marquez.: Statistical processing for telecommunication networks applied to ATM traffic monitoring. PhD thesis, Loughborough University (1997) nd 7. Larson, Harold J.: Introduction to probability theory and statistical inference. 2 edn., Wiley (1974) nd 8. Lee, Peter M.: Bayesian statistics : an introduction. 2 edn. Arnold, London 1997. 9. Mouharam, M. Tunnicliffe, A. J. Curley.: Monitoring VBR Traffic and markov chain model on ATM Network. Pgnet 2000, Liverpool (2000)

ATM Traffic Prediction Using Artificial Neural Networks and Wavelet Transforms 1

2

Priscilla Solís Barreto and Rodrigo Pinto Lemos 1

Catholic University of Goiás-UCG, Department of Computer Science, Av. Universitária 1440 Setor Universitário, CEP 74605-010, Goiânia, Goiás, Brazil. [email protected] 2 Federal University of Goiás –UFG, Department of Electrical Engineering, Praça Universitária s/n, Setor Universitário, CEP 74605-220, Goiânia, Goiás, Brazil. [email protected]

Abstract. This work proposes a method of combining wavelet transforms to feed forward artificial neural networks for ATM (Asynchronous Transfer Mode) traffic prediction. Wavelet transforms are used to preprocess the nonlinear time- series in order to provide a step-closer phase learning paradigm to the artificial neural network. The network uses a variable length time window on approximation coefficients over all scales. It was observed that this approach could improve the generalization ability as well as the accuracy of the artificial neural network for ATM traffic prediction.

1

Introduction

During the last years many researchers have observed the self-similarity of Asynchronous Transfer Mode (ATM) traffic. The certain modeling of the statistical multiplexing process, that promotes the traffic switching with variable bandwidth on different applications, is fundamental for the prediction process. Recently, several works modeled ATM traffic as a fractal phenomenon, with self-similarity and long dependence characteristics, especially in the case of Ethernet video traffic [1][2][3]. The multiplexing process of nodes in ATM networks uses a finite buffer, the longtime dependence produces delays and lost of cells, compromising the network quality service parameter and producing congestion situations. Then the traffic prediction task with some antecedence may provide the network controllers a multiplexing adjustment to avoid or minimize these effects. Artificial neural networks (ANN) have demonstrated great potential for time-series prediction. Several works point their capabilities for nonlinear time-series forecasting that appear especially interesting for signal prediction models. This correspondence presents a learning paradigm called phase learning that improves the generalization ability and reduces the computational cost of neural networks for ATM traffic prediction. To demonstrate the efficacy of this method, two comparative prediction experiments are driven on real ATM traffic. P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 668–676, 2001 © Springer-Verlag Berlin Heidelberg 2001

ATM Traffic Prediction Using Artificial Neural Networks and Wavelet Transforms

669

1.1 Wavelet Transforms In the signal processing analysis there are several mathematical tools for signal decomposition. The wavelet transforms functions make possible to frame a signal in regions of variable size that allows the analysis of the signal in different time scales, producing an automatic mapping of a signal in a time-frequency plane. The use of wavelets is especially interesting for signals that have non-stationary variations and self-similarity characteristics. In the wavelet analysis, the signal low frequencies are identified as the approximation coefficients and the high frequencies are identified as the details. This can be seen as the original signal passing in a filtering process; with a lowpass filter producing the approximation coefficients and a highpass filter producing the details. Given a scale function φo and a basic wavelet ψo, the discrete wavelet transform (DWT) is defined as: X (t ) → {{a j , k , k ∈ Z }, {d jk , j = 1,2,...., j , k ∈ Z }}

(1)

The coefficients are defined as the internal product between X and two sets of functions. a jk =< X , φ o

j ,k

> d jk =< X , ϕ 0

j ,k

>

(2)

ψ0j,k (respectively φ0j,k) represents translations and dilations of ψ0 (respectively φ0), called basic wavelet function. The multiresolution analysis (MRA) resides in the computation of a wavelet system for the decomposition and reconstruction of a signal x(t) using and ortonormal base. The decomposition permits the approximation of a signal at different resolutions. There are two fundamental functions used to obtain a wavelet system: the scale function and the basic wavelet function, as seen in equation 5 and 6 respectively, where Z are the integer set and ak are the wavelet coefficients. Both functions are prototypes of a class of ortonormal functions. φ (t ) = ∑ a k φ (2t − k )

(3)

ψ (t ) = ∑ (−1) k a k +1φ (2t − k )

(4)

k∈Z

k∈Ζ

The phase learning paradigm introduced in this work decomposes the signal at different levels of detail using wavelet transforms. This decomposition produces different versions of the original signal, with coarsest versions in the higher scales and finest versions in the lower scales.

2

Models for ATM Traffic Prediction

Given a nonlinear time series with n samples, { y[i],i=1,2,…n}, representing the number of cells produced by an ATM source in n discrete time intervals, the goal is to predict the series value in the interval n+k, k=1,2,…, considering the series values

670

P. Solís Barreto and R. Pinto Lemos

until time interval n. In order to compare the quality prediction, the normalized mean square error was adopted as a performance parameter. The NMSE is computed as: NMSE =

1

σ

2

p



∑ [( y ( k ) − y ( k )] p

(5)

2

k =1

where y(k) is the observed value of the time series at time k, ŷ(k) is de predicted value 2 of y(k) and σ is the variance of the time series over the prediction duration. Thus, a NSME=1 corresponds to predicting the estimated mean of the series. 2.1 Model 1: ATM Traffic Prediction Using ANN The model consists of a MLP network, with sigmoid activation functions on every layer, one output neuron, m input units and two hidden layers, as illustrated in figure 1. x n-m x n-m + 1 x n-m + 2

. . x n-1 X1 x2 x3

X2

x4

X3

. .

. .

xm + 1

. .

x1

Xm

. .

. .

Xm + 1

x2 x3 C e ll so urc e

. . xm

Fig. 1. MLP network used to predict ATM traffic.

The Levenberg-Marquadt algorithm was used in the learning process training, which uses numerical optimization techniques that appear to give a higher convergence speed for neural networks learning [4]. The initialization function of the

ATM Traffic Prediction Using Artificial Neural Networks and Wavelet Transforms

671

weights is based on Nguyen and Widrow [5] technique. This function is implemented on the Neural Network Toolbox of Matlab 5.2.0.03084, January 1998 for Windows. Several works have been done in predicting ATM traffic using models based on neural networks. In [6], they are used for predicting VBR traffic and in [7] three different models are used for the interpretation of aggregated traffic. In [8], a three layer MLP is used to predict ATM traffic in a network with military purposes. A major problem in neural learning is the overfitting that results when the neural network also memorizes from the training sets the statistical noise, making it difficult to establish statistical relations between the data. The result is generalization incapacity i.e., the neural network cannot generalize well to cases that were not included in the training set. 2.2 Model 2: ATM Traffic Prediction Using ANN and Wavelet Transforms Several works seeking the ATM traffic prediction task using wavelet transforms have been done. In [9], Dantas proposes four analysis methods for ATM multiscale traffic prediction. The fact that the ATM traffic has a fractal behavior makes the prediction task more difficult, because the stochastic processes are not stationary or long dependence stationary. Also, Liang and Page [10] discuss about the learning capacity of an ANN and a multiresolution paradigm that breaks the original signal in several versions using wavelet transforms is proposed, searching the improvement of the ANN prediction task. Using the above works as a reference, the proposal of this predictor consists to input the ANN a set of training sets preprocessed using wavelet transforms. The training sets are formed with vectors of different sizes, unlike to traditional network learning which employs a single signal representation for the entire training process. The zero scale corresponds to the original signal. The ANN will be trained with different scale versions of the original signal, trying to achieve a faster learning time and a less computational effort The model consists of an ANN similar to the one described in model 1 but with a prior preprocessing of the signal using the Haar wavelet transform in the following s r r manner: being X the original signal, Tr(x ) is the learning activity done in the x scale r r of the original signal X . The resulting x signal is composed only by the approximation coefficients. The details of the signal are discarded in each calculated r scale. When r increases, the quantity of points of the original signal in the scale x r diminishes in a proportion 2 . Though, this can be interpreted as a visualization of the signal when fewer details and a lesser quantity of points. Interpreting the notation j i j Tj(x )→Ti(x ) as the training activity Tj with training set x preceding the training i r activity Ti with training set x , the training activities are given by the set {Tr(x ), j i 0 r=1,2,3,..n}, where Tj(x )→Ti(x ) for i=j-1 e n≥j≥1. Clearly appears that the set T0(x ) denotes the training activity with the original signal. Figure 2 illustrates the model for the prediction task. The ANN weights are initialized just once during the first training activity (with the higher scale), afterwards they are just adjusted by the next learning activities with the lower scales.

672

P. Solís Barreto and R. Pinto Lemos

X

. .

i= r,r-1,r-2,..,0 m > r> = 0 DWT i x

s

d

1

x

1

d

2

x

2

d

3

x

d

r

C e ll so urc e

x

3

r

xn-1-m xn-m xn-m + 1 .. xn-2 x2 x3 x4 .. xm + 1

X1 X2 X3 .

. .

. .

Xm + 1

Xm x1 x2 x3 .. xm

Fig. 2. MLP network with DWT Haar signal preprocessing for ATM traffic prediction. The ANN input consists of m neurons, with two hidden layers and one output neuron. The vectors r x , resulting of the approximation coefficients of Haar wavelet transform are the different input training sets.

3. Experimental Results 3.1 The Time Series The temporal series where obtained from real data from Bellcore of Ethernet network traffic. It was necessary to make a conversion of the data to characterize the ATM traffic. Two resulting series where obtained with the conversion: BC-OCTEXT and BC-OCTINT. The series BC-OCTINT consists of 1,759 seconds, in a time scale of 1 second, corresponding to 29 minutes and 31 seconds of internal traffic. The series BC-OCTEXT consists of 122,797.83 seconds, corresponding to 1,000,000 of packets of external traffic in a minute scale, resulting in 2046 points corresponding to 34 hours and 10 minutes of traffic. Figure 3(A) and 3(B) shows the series BC-OCTINT and BC-OCTEXT respectively.

ATM Traffic Prediction Using Artificial Neural Networks and Wavelet Transforms

(A) BC -O C TINT

673

(B) BC -O C TEXT

Fig. 3. (A) BC-OCTINT in second scale and BC-OCTEXT in minute scale testing series.

3.2 MLP ATM Traffic Prediction In the case of the BC-OCTEXT time series were used three sets: a learning set, formed by elements 1 to 800, a validation set formed by elements from 801 to 1000 and a test set formed by elements 1001 to 2000. The prediction was made using a MLP network with m=10, two neurons in each hidden layer, resulting in a configuration of 10x2x2x1 and a learning rate of 0.01. In this case, the prediction quality was resulting NSME=0,42506. Figure 4(A) shows the prediction result.

Fig. 4. (A) BC-OCTEXT prediction with NSME=0,42506. Real time series solid line, predicted time series dotted line. (B) BC-OCTINT prediction with NSME=0,92008. Real time series solid line, predicted time series dotted line.

674

P. Solís Barreto and R. Pinto Lemos

In the case of the BC-OCTINT time series, the training set was formed with 600 points (800 to 1499), the validation set from points 100 to 599 and the test set with points from 1500 to 1699. A MLP 20x10x10x1 was used with a learning rate of 0.01 and the prediction result quality was an NSME=0,92008, that shows a low generalization capacity of the network, as seen in figure 4(B). S c ale 0 0 .2 5

0 .2 5

0 .2

0 .2

0 .1 5

0 .1 5

0 .1

0 .1

0 .0 5

0 .0 5

0

0

10

20

30

40

50

60

70

S c ale 2

0 .1 8

0

0 .1 6

0 .1 4

0 .1 4

0 .1 2

0 .1 2

0 .1

0 .1

0 .0 8

0 .0 8

0 .0 6

0 .0 6

0 .0 4

0 .0 4

0 .0 2

0 .0 2

0

2

4

6

8

5

10

15

10

12

14

16

0

1

20

25

30

35

S c ale 3

0 .1 8

0 .1 6

0

0

S c ale 1

2

3

4

5

o

1

6

2

7

8

3

Fig. 5. BC-OCTEXT: training sets, four scales x , x , x , x .

3.3 MLP and Haar Wavelet Transform for ATM Traffic Prediction In the second experiment, appeared that the training sets could be reduced as well as the MLP complexity. Also, there was observed that the early stopping procedure adopted in the first experiment did not improve the prediction quality, so there was no need for defining a validation set. The training set for the time series BC-OCTEXT was formed with 64 points and the test set was formed with elements from point 1001 to 2000. The scale of decomposition using the predictor model described in figure 2 3 2 1 0 was j=3 resulting in 4 training sets x , x , x and x , the latter corresponding to the original time series. The training sets are shown in figure 5. The MLP used was 4x2x2x1, resulting in a less computational effort for training. The prediction quality was NSME=0,39951, as illustrated in figure 6. In the case of the time series BC-OCTINT the training set was formed by the elements 1 to 256 and the test set with elements from point 1000 to 1699. It is important to note that in this second test set, there is an interval of abrupt variation

ATM Traffic Prediction Using Artificial Neural Networks and Wavelet Transforms

675

with increases the prediction difficult. As with the time series BC-OCTEXT, the MLP used was a 4x2x2x1 and the prediction quality was NSME=0,46195, showing a significant improvement. The prediction result is illustrated in figure 7.

F Fig. 6. (A) BC-OCTEXT MLP-wavelet transform prediction with NSME=0,39951, real time series solid line, predicted time series dotted line.

Fig. 7. BC-OCTINT MLP-wavelet transform prediction with NSME=0,46195, real time series solid line, predicted time series dotted line.

676

4

P. Solís Barreto and R. Pinto Lemos

Conclusions

The conventional learning process in neural networks is sometimes inadequate for nonlinear, nonstationary signal prediction problems and often yields poor generalization performance. The combination of artificial neural networks and wavelet transforms for ATM traffic prediction permits a preprocessing of nonlinear time-series with fractal behavior. The neural network learns gradually from simpler to more complex training sets introducing a phase learning paradigm. This process permits a neural network complexity reduction and the pursuit of predictors that have a better generalization capacity with a low computational cost that appears to perform well enough to be of practical value.

References 1. Beran J., Sherman R., Taqqu M.S, Willenger W.: Long Range Dependence in Variable bit-rate Video Traffic. IEEE Trans. Comm, Volume 43, (1995), 15661579. 2. Ryu B.K., Elwalid A.: The importance of Long-Range Dependance of VBR Video Traffic in ATM Traffic Engineering Myths and Realities. ACM SIGCOMM, San Francisco CA, 1996. 3. Leland W.E. et al.: On the Self-Similar Nature of Ethernet Traffic (extended version). IEEE/ACM Trans. Net., Volume 2, (1994) 1-15. 4. Mathworks, Inc.: Neural Network Toolbox User´s Guide, 1997. 5. Nguyen D., Widrow B.: Improving the learning speed of 2-layer neural networks by choosing initial values of the adaptive weights. Proceedings of the International Joint Conference on Neural Networks, Volume 2. (1993) 357-363. 6. Drossu R., Lakshman T.V., Obradovic Z., Raghanvendra C.: Single Multiple Frame Video Traffic Prediction Using Neural Networks Models. Computer Networks, Architecture and Applications. S.V. Raghavanan, B.N. Jain Editors. Chapmann and Hall (1995) 146-158. 7. Nordstrom E., Galmo O., Gusraffson M., Asplund L. : Neural Networks for Admission Control in ATM Networks. Proceedings of the First Swedish National Conference on Connectionism. Skivde, Sweden (1992). 8. Lobejko W. Traffic Prediction by Neural Approach. IEEE Transactions on Signal Processing, Vol 45 N.11 (1996) 571-575. 9. Dantas Maria J.: Multiscale ATM Traffic Prediction using fractal modelling and Wavelet Analysis. Msc. Thesis. Federal University of Goiás. Goiás, Brazil. (2000) 10. Liang Y., Page E.: Multiresolution Learning Paradigm and Signal Prediction. IEEE Transactions on Signal Processing, Vol 45. (1997) 2858-2864.

Threshold-Based Connection Admission Control Scheme in ATM Networks: A Simulation Study 1

2

Xiaohong Yuan and Mohammad Ilyas 1

Dept. of Computer Science, North Carolina A & T State University, 1601 East Market Street, Greensboro, NC 27411. [email protected] 2 Dept. of Computer Science and Engineering, Florida Atlantic University, 777 Glades Road, Boca Raton, FL 33431. [email protected]

Abstract. In this paper, a new threshold-based connection admission control scheme is proposed and analyzed. The scheme uses effective bandwidth for making decision about acceptance or rejection of a connection request. This threshold and effective bandwidth based method is simulated on an 8-node network model. The traffic used in the simulation is a multiplexed stream of cells from video, voice and data sources, which is typical to ATM environment. Simulations on the 8-node network model shows that, in a network that supports several service categories, having a threshold-based connection admission control affects the blocking probabilities of each type of traffic. In some environments, having a threshold is advantageous over the case without a threshold in terms of cell loss ratio, cell transfer delay and power (defined as throughput divided by cell transfer delay).

1

Introduction

Connection Admission Control (CAC) is one of the functions defined by ATM forum for managing and controlling traffic and congestion in ATM networks [1, 2, 3]. It is defined as the set of actions taken by the network during the call set-up phase in order to determine whether a connection request can be accepted or should be rejected. Based on the source of information used to make admission decision, the existing CAC schemes fall into two categories: model-based CAC and measurement-based CAC [4]. Model-based CAC schemes require each source characterize the offered traffic a priori in terms of the parameters of a deterministic or stochastic model, while measurement-based CAC schemes rely mainly on real-time traffic measurements to make admission decisions, although they may also rely on information provided by the user. Typical model-based CAC schemes include effective bandwidth based approaches [5, 6, 7] and cell loss probability estimation based approaches [8, 9, 10]. In this paper a new threshold-based CAC method is proposed. The basic idea is, when a new connection request arrives, instead of checking whether the available resource can accommodate the new connection or not, it is proposed to check whether a percentage of the available resource would accommodate this new connection. Let x represent the percentage, and assume the traffic request parameters required by the

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 677–686, 2001 © Springer-Verlag Berlin Heidelberg 2001

678

X. Yuan and M. Ilyas

new connection are represented by the requested resource, then the if-then connection admission rule can be stated as follows: If x × available resource ≥ requested resource, Then accept the connection. Otherwise, reject the connection. Adding a threshold x to available resource in making admission decision implies that, a certain amount of resource is always reserved for some later use. Through simulation it is found that with a threshold, some type of traffic is blocked in favor of other types of traffic. Having a threshold may also affect the network throughput, loss or delay performance. Given a network, by adjusting the threshold a better network throughput, or better loss or delay performance can be achieved. To apply the threshold-based CAC, the effective bandwidth method due to Guérin et al. [5] is adopted to represent the available resource and the requested resource. Effective bandwidth is a measure of a connection’s bandwidth requirement relative to the required QoS constraint, such as the delay and/or loss experienced by a connection’s cells. The effective bandwidth concept is convenient to implement the threshold-based CAC, since one could just compare the effective bandwidth of the coming connection with certain percentage of available bandwidth (which is link capacity minus the sum of the effective bandwidth of all existing connections). This paper presents a simulation study of the threshold-based CAC scheme. The threshold-based CAC scheme is simulated in an 8-node network model. The traffic used is a multiplexed stream of cells from data, voice and video sources typical to ATM environment. In what follows, the multiplexed traffic used in the simulation, the simulation model and algorithm, the verification of the simulation model are introduced. The simulation results are presented and summarized.

2

Generating Multiplexed Traffic and Measuring the Traffic Characteristics

In ATM environment, traffic is usually a multiplexed stream of cells from data, voice and video sources. When data, voice and video traffic are multiplexed over one output link, video traffic is given the highest priority, voice traffic is given the next highest priority, and data traffic is given the lowest priority when there is contention for the output link [11]. With video and data traffic modeled as Markov-modulated Bernoulli processes and voice traffic represented by ON-OFF Bernoulli process [3, 12, 13, 14], the video, voice and data sources being multiplexed can be characterized by parameters in Table 1 [15]. In Table 1, the loading factor specifies the percentage of time when a source actually generates traffic. Each source can be represented as a two-state process as shown in Fig. 1. For video traffic, the states are burst and non-burst, for data traffic, the states are high-rate and low-rate states. According to the source descriptions in Table 1, the data rate at each state, and the values of α , β can be obtained. The discrete event simulation [16, 17] is used to generate the multiplexed traffic. According to the two-state process model, one could schedule the cell arrival process for a single video, voice or data source. The multiplexing of the three sources is implemented by selecting one cell from a voice, a video and a data cell that are scheduled to transmit according to the priority policy. This implementation assumes that the buffer at the multiplexer has infinite length.

Threshold-Based Connection Admission Control Scheme in ATM Networks

679

Table 1. Source descriptions Service Categories η1 : Data traffic (Markov-modulated Bernoulli process)

Parameters High bit rate = λ1h Low bit rate = λ1l Transition probability from high-to-low rate = PHL Low-to-high rate = PLH Loading factor: l1*

η2 : Voice traffic (CBR: On-Off Bernoulli process

On-state bit rate = λ2 On-to-on state probability = PonT Off-to-off state probability = PoffT Loading factor: l2*

η3 : Video traffic (VBR: modulated process)

MarkovBernoulli

Non-bursty bit rate = λ3 0Burstiness ratio = BP Transition probability from bursty-to-nonbursty state = PBN Transition probability from nonbursty-to-bursty state = PNB Loading factor: l3*

(Note: l1* + l2* + l3* = 1 )

α

1- α

OFF

1-

β

ON

β Fig. 1. Two-state process

The multiplexed traffic generated will be fed to the proposed network model to evaluate network performance with certain connection admission control schemes. When the user requests a connection, it is assumed that the user provides the source traffic descriptor parameters at the time of requesting a connection. What traffic descriptors the user needs to provide depends on the CAC scheme. The thresholdbased CAC scheme is based on the effective bandwidth by Guérin et al. [5]. Assuming a single source feeding a finite capacity queue of size K with constant service rate. The source is an Interrupted Fluid Process (IFP) characterized by ( R, r , b ), where R is the peak rate, r is the fraction of time the source is active, and b is the mean duration of the active period, the equivalent capacity ( c ) of the source that corresponds to a cell loss ratio ( ε ) is given by:

680

X. Yuan and M. Ilyas

c= where

a − K + (a − K ) 2 + 4 Kar R 2a

(1)

a = ln(1 / ε )b(1 − r ) R .

For sources with generally distributed burst or idle period, the first and second moments of the burst/idle period are mapped into the first moment of an equivalent, exponentially distributed burst/idle period. The equivalent mean burst and idle periods b' and I ' are given by b' = δb and I ' = δI , where b and I are the original mean burst and idle periods, and δ is selected as:

δ =

b2 2b 2

×

I2 2I 2

.

(2)

The effective bandwidth is then calculated using this equivalent IFP source. The multiplexed traffic generated is an ON-OFF fluid process but with nonexponential burst/idle period. Therefore to calculate the effective bandwidth, the peak cell rate (PCR), sustainable cell rate (SCR), b , I , b 2 and I 2 are measured on the multiplexed traffic generated and it is assumed that they are provided by the user when the user requests for a connection.

3

The Simulation Model and Algorithm

The simulation model represents a typical virtual circuit between users of a broadband ISDN. A network model with eight switching nodes is shown in Fig. 2. The switching nodes are connected to user nodes. Assume user A, B, F send multimedia data to user D, E and C respectively from time to time. From user A there are three routes to get to user D. They are: (1) from user A to node 1 to 2 to 3 to 4 and then to user D; (2) from user A to node 1 to 7 to 8 to 4 and then to user D; (3) from user A to node 1 to 6 to 5 to 4 and then to user D. From user B there are also three routes to get to user E. They are: (1) from user B to node 2 to 3 to 8 to 5 and then to user E; (2) from user B to node 2 to 7 to 8 to 5 and then to user E; (3) from user B to node 2 to 7 to 6 to 5 and then to user E. From user F there are three routes to get to user C also: (1) from user F to node 6 to 7 to 8 to 3 and then user C; (2) from user F to node 6 to 5 to 8 to 3 and then user C; (3) from user F to 6 to 7 to 2 to 3 and user C. Non-blocking switches are assumed in the model, and it is assumed that each output port has its own dedicated buffer. It is assumed that this network supports three service categories, each of which has different traffic characteristics and requires different amount of resources. Each service category is a multiplexed stream of cells from video, voice and data sources. User A, B and F keep generating connection requests of three types to the network. The arrival process of the connection requests of each type from each user is assumed to follow Poisson process, and the holding time of a connection admitted to the network is assumed to have exponential distribution. If a connection is admitted to the network, then cells are generated for this connection and are transmitted through

Threshold-Based Connection Admission Control Scheme in ATM Networks

681

the network. If a connection is rejected, it is cleared. In the simulation, the traffic descriptor used includes: PCR, SCR, b , I , b 2 and I 2 , and CLR is specified as the requested QoS parameter. The statistics collected in the simulation are: blocking probability, cell loss ratio (CLR), average cell transfer delay (CTD) and power (defined as throughput divided by cell transfer delay).

B

switching node

C

user node (source)

1

2

3

7

8

6

5

user node (destination)

4

D

A

F

E

Fig. 2. An 8-node network model

In the simulation algorithm, the process of determining the route is embedded in the process of making admission decision. When a connection request arrives, the connection admission controller searches among all possible routes the one that has the maximum available bandwidth. Then the effective bandwidth of this connection is compared with the x percent of this maximum available bandwidth. If the former is less than or equal to the latter, then the connection request is accepted, otherwise it is rejected. If the connection is accepted, then it should take the route that has the maximum available bandwidth. This routing algorithm helps to balance the load at each route or link, so that the network will not have some links overly loaded but have some other links under loaded. The simulation program is written in C and the event scheduling approach has been used so as to minimize execution time.

4

Model Verification

The queueing theory results are used to verify the simulation program. Due to the complexity of the 8-node network model, the closed form solution for the blocking probability of each type of traffic is very difficult to obtain. The following techniques are then used to verify the simulation program: (1) Run the simulation for simpler cases. For example, we could assume only one user is generating traffic, and it is generating only one type of traffic. The closed form solution for the blocking probability for this situation could be obtained. (2) By letting some parameters in the 8-node network model take some special values, the 8-node network model could

682

X. Yuan and M. Ilyas

reduce into a simpler network model for which the closed form solution for the blocking probability could be solved. When only user A is generating traffic, and it only generates one type of traffic, the blocking probability of the connection requests can be solved [18, 19, 20]. A program is written to calculate the blocking probability. The calculated theoretical values are compared with the simulation results to verify the correctness of the simulation program. Let the links from node 1 to 2, from 1 to 6, from 7 to 6, and from 2 to 3 take value 0, and assume only user A and user B are generating traffic, the 8-node network model reduces to the model shown in Fig. 3 (the links that the traffic can never get to are not shown in the figure). B

sw itch in g n od e u ser n od e (sou rce)

2 1

7

u ser n od e (d esition a tion ) 8

4

D

A 5 E

Fig. 3. The reduced network model

In this reduced network model, assume three types of connection requests are generated from user A to user D, and from user B to user E. The closed form solution for the blocking probability of each type of traffic can be solved [20]. A program is written to calculate the blocking probabilities of the three types of traffic and the theoretical values are compared with the simulation result to verify the correctness of the simulation. Little’s theorem is also used to verify the simulation model [21]. Applying Little’s theorem to our network situation, we have: mean number of cells in the network = cell arrival rate × mean time a cell spends in the network. This relation is verified in our simulation.

5

Simulation Results

Assume the average arrival rates and holding times of the connections of the three types of traffic take the values in Table 2. Also assume the buffer size at each node is 50. The descriptions of the traffic sources and traffic contracts for the three service categories used in the simulation are given in [20]. Each service category is the multiplexed traffic of a video, a voice and a data source. The descriptions of the sources being multiplexed are used in generating the multiplexed traffic. The values of the parameters in the traffic contract are obtained through measurement on the

Threshold-Based Connection Admission Control Scheme in ATM Networks

683

generated multiplexed traffic. They are provided to the connection admission controller to make admission decision. Table 2. Average arrival rate and holding time of the connections

Service Category I

Arrival Rate 5 × 10 −5

Holding Time 1.0 ×10 5

II

5 × 10 −5

7.5 × 10 4

III

5 × 10 −5

5.0 × 10 4

The threshold-based CAC scheme is simulated in the 8-node network model under a variety of situations. Fig. 4 shows how the blocking probability, CLR, the CTD and the power change when the threshold x changes from 0.1 to 1.0. Fig. 5 shows how blocking probability, CLR, CTD and power change as the average arrival rate of type I calls changes, when x = 1 (i.e., without threshold) and when x = 0.5. Fig. 6 shows how blocking probability, CLR, CTD and power change as the average arrival rate of type II calls changes, when x = 1 and when the thresholds for type I, type II and type III calls are 0.5, 1 and 0.5 respectively. -8

0.6

aggregate CLR

type1 type2 type3

0.8

0.4 0.2 0

average CTD

2

0

0.5 x

1 0.5

4.4

0.4

4.2

0.35

4

0.3

3.8 3.6 3.4

x 10

1.5

0

1

power

blocking probability

1

0

0.5 x

1

0

0.5 x

1

0.25 0.2

0

0.5 x

1

0.15

Fig. 4. Blocking probability, CLR, CTD, power versus threshold x

684

X. Yuan and M. Ilyas -8

4

x=1 x=0.5 type1 type2 type3

0.2 0.15 0.1

aggregate CLR

blocking probability

0.25

0.05 0

0

2 1

0

-4

x 10

0.5

x=1 x=0.5

4

0.5 arrival rate

1 -4

x 10

x=1 x=0.5

0.45

4.5

3.5

x=1 x=0.5

3

0

1

power

average CTD

5

0.5 arrival rate

x 10

0.4 0.35

0

0.5 arrival rate

1 -4

x 10

0

0.5 arrival rate

1 -4

x 10

Fig. 5. Blocking probability, CLR, CTD, and power versus arrival rate of type I calls

6

Conclusion

The following conclusions can be drawn from the simulation results of the thresholdbased CAC scheme in the 8-node network model:



• •

In a network that supports several service categories, having a threshold-based CAC affects the blocking probabilities of each type of traffic. When all the traffic types are given the same threshold value, the blocking probability of the type that has the highest bandwidth requirement will increase, and the blocking probability of the type that has the lowest bandwidth requirement will decrease. When different threshold values are used for different types of traffic, the blocking probabilities of those types that are given smaller threshold values will increase, and the blocking probabilities of those types that are given higher threshold values will decrease. The simulation results show that, with the threshold-based CAC, the aggregate cell-loss ratio and average cell transfer delay are smaller, and the power is higher compared with the case without a threshold.

Threshold-Based Connection Admission Control Scheme in ATM Networks

685

-7

0.3 0.2 0.1 0

0

5.5

0.5 arrival rate

0

x 10

4

0.5 arrival rate

1 -4

x 10

x=1 x=0.5 1 0.5

0.4

4.5

3.5

0.5

-4

x=1 x=0.5 1 0.5

5

x=1 x=0.5 1 0.5

1

0

1

power

average CTD

1.5

x=1 x=0.5 1 0.5 type1 type2 type3

aggregate CLR

blocking probability

0.4

x 10

0.35 0.3 0.25

0

0.5 arrival rate

1 -4

x 10

0.2

0

0.5 arrival rate

1 -4

x 10

Fig. 6 Blocking probability, CLR, CTD, power versus arrival rate of type II calls with different thresholds for different types



The power changes as threshold takes different values between 0.1 to 1. In some network environments, the power reaches its peak value when x is between 0.1 and 1. Our future research will involve searching for mechanisms for changing x dynamically as the traffic condition changes in the network so as to improve network performance.

References 1. Adas, A., “Traffic Models in Broadband Networks,” IEEE Communications Magazine, pp. 82-89, July 1997. 2. ATM Forum, “Traffic Management Specification,” Version 4.1, March 1999. 3. Perros, H.G. and Elsayed, K. M. “Call Admission Control Schemes: A Review,” IEEE Communications Magazine, vol. 34, no. 11, pp. 82-91, 1996. 4. Ren, Q. and Ramamurthy, G. “A Hybrid Model and Measurement Based Connection Admission Control and Bandwidth Allocation Scheme for ATM Networks,” GLOBECOM 98, IEEE Global Telecommunications Conference, pp. 1016-1023, 1998.

686

X. Yuan and M. Ilyas

5. Guérin, R., Ahmadi, H. and Naghshineh, M. “Equivalent Capacity and Its Application to Bandwidth Allocation in High-Speed Networks,” IEEE Journal on Selected Areas in Communications, vol. 9, no. 7, pp. 968-981, September 1991. 6. Elwalid A. and Mitra D., “Effective Bandwidth of General Markovian Traffic Sources and Admission Control of High Speed Networks,” IEEE/ACM Transactions on Networking, vol. 1, no. 3, pp. 329-343, June 1993. 7. Rege, K. M. “Equivalent bandwidth and related admission criteria for ATM stystems – a performance study,” International Journal of Communication Systems, vol. 7, pp.181-197, 1994. 8. Murase, T., Suzuki, H., Sato, S. and Takeuchi, T. “A Call Admission Control Scheme for ATM Networks Using a Simple Quality Estimate,” IEEE Journal on Selected Areas In Communications, vol. 9, no. 9, pp. 1461-1470, December 1991. 9. Saito, H. “Call Admission Control in an ATM Network Using Upper Bound of Cell Loss Probability,” IEEE Transactions on Communications, vol. 40, no. 9, pp. 1512-1521, September 1992. 10. Lee, S. and Song J. “An Integrated Call Admission Control in ATM Networks,” IEICE Transactions on Communications, vol. E82-B, no. 5, pp. 704-711, 1999. 11. Neelakanta, P. S. A Textbook on ATM Telecommunications: Principles and Implementation. CRC Press, Boca Raton, Florida, 2000. 12. Adas, A., “Traffic Models in Broadband Networks,” IEEE Communications Magazine, pp. 82-89, July 1997. 13. Frost V. S. and Melamed B., “Traffic Modeling for Telecommunications Networks,” IEEE Communications Magazine, pp. 70-81, 1994. 14. Bae, J. J. and Suda, T. “Survey of Traffic Control Schemes and Protocols in ATM Networks,” Proceedings of the IEEE, vol. 79, no. 2, pp. 170-189, 1991. 15. Neelakanta, P. S. and Deecharoenkul, W. “A complex system characterization of modern telecommunications services,” Complex Systems, in press. 16. Sadiku, M. N. O. and Ilyas, M. Simulation of Local Area Networks. CRC Press, Inc. 1995. 17. Ilyas, M. “Simulation: A Powerful Tool for Performance Evaluation of Telecommunication Networks,” Technical Report (TR-CSE-92-9). Department of Computer Science and Engineering, Florida Atlantic University, 1992. 18. Cooper, R. B. Introduction to Queueing Theory (Third Edition). CEEPress Books, 1990. 19. Tilt, B. Solution Manuals for Robert B. Cooper’s Introduction to Queueing Theory, Second Edition. Elsevier Science Publishing Co., Inc. 1981. 20. Yuan, X. A Study on ATM Multiplexing and Threshold-Based Connection Admission Control in Connection-Oriented Packet Networks. Dissertation, Dept. of Computer Science and Engineering, Florida Atlantic University, 2000. 21. Jain, R. The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling. John Wiley & Sons, Inc. 1991.

ABR Congestion Control in ATM Networks Using Neural Networks 1

K. Dimyati and C.O. Chow

2

Department of Electrical Engineering, Faculty of Engineering, University of Malaya 50603 Kuala Lumpur MALAYSIA 1 2 [email protected], [email protected]

Abstract. This paper presents the Neural Indicates Explicit Rate (NIER) scheme, in which an artificial neural network (ANN) is used to obtain suitable Explicit Rate (ER) for congestion control of Available Bit Rate (ABR) service in ATM networks. The neural network used in this scheme will monitor the queue status in switches' buffer and output suitable ER value to be carried by Resource Management (RM) cells to the sources for their rate adjustment. A comprehensive comparison study between the proposed algorithm and two well-known algorithms is done and simulation results prove that the proposed algorithm gives good performance in both LAN and WAN topologies.

1

Introduction

According to the ATM forum [1], there are currently six services for ATM networks but only Available Bit Rate (ABR) and Unspecified Bit Rate (UBR) are designed to handle bursty data applications. ABR service is believed to have better performance in handling data applications because it is associated with traffic management that allows the switches to monitor the network behavior and feedback related information by resource management (RM) cells to sources. The sources will adjust their own data rate based on the information obtained. This traffic management task is indispensable because it is the core that controls network efficiency and delivers the negotiated Quality of Service (QoS). Congestion control is one of the most important tasks of traffic management. Congestion control is a dynamic problem that cannot be solved by conventional static solution [2][3]. This can be proven by simple simulation showing that congestion still occurs in the network even with the increment of buffer size, bandwidth or processing speeds. Therefore, neural network is used to handle this difficult task in this paper because neural network perform powerful mapping and adaptation ability. Conventionally, only EFCI bit is used for congestion control purpose [4]. Further researches propose that ER indication could provide faster and better performance [2] and researchers have proposed different approaches in determining ER, such as NIST ER [5] and EPRCA [6]. ER is defined as the maximum allowable cell rate for the source in the next cycle. The remainder of the paper is organized as follows: in section 2, the proposed algorithm is explained; Section 3 presents the simulations model and the choices of suitable parameters. The results obtained from the simulations are reported in section

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 687–696, 2001 © Springer-Verlag Berlin Heidelberg 2001

688

K. Dimyati and C.O. Chow

4 and followed by related discussion. algorithm are explained.

2

Finally, the properties of the proposed

NIER Scheme

The switching scheme presented in this paper is known as Neural Indicates Explicit Rate (NIER) scheme. The main motivation in designing this scheme is to implement neural network to provide simple but effective congestion control. Several researchers have suggested the use of neural network [7][8][9], but they focused on using neural network in predicting traffic pattern. Hence, this paper presents a complete algorithm using neural network to monitor network status and decide the amount of bandwidth that should be occupied. The NIER scheme is a rate-based end-to-end closed-loop feedback scheme and uses RM cells to carry feedback information. It follows all the rules set by ATM Forum [1]. The operation of this switching scheme can best be represented with Fig. 1.

Fig. 1. Operation of the proposed NIER scheme

As mentioned before, the scheme follows the specification by the ATM Forum, therefore the basic operation is the same with other switching schemes. The major difference is how the ER is measured. The neural network monitors the queue status in switches' buffer for every fixed measurement interval (N). After every N ABR cells have been received, the neural network will calculate a suitable ER value based on the readings of queue length for current and previous intervals. When a BRM cell reaches the switch, the calculated value is compared with the ER value in the BRM cell, if the calculated value is smaller than the current ER value, the ER field in BRM cell will be updated. Anyway, if the calculated value is greater than current ER value, the ER field in BRM cell will be maintained. In our algorithm, two inputs are needed. They are the current and previous queue lengths. These two inputs are essential in providing the neural network enough information about the status of the network. From the current queue length, the neural network able to know the queue occupancy and the level of congestion. Besides, the neural network will compare current queue length with the previous queue length to obtain information about the rate of change for the buffer. This is a good measurement of whether there is a possibility for the network to be congested or not. If the network is not congested, this is also a very good indication for the network to fully utilize the network resources. The output of the neural network is the link fraction (LF) that should be used by the VC based on the current load condition. The value for LF is ranged from 0 to 1; a

ABR Congestion Control in ATM Networks Using Neural Networks

689

value closes to 0 indicates the network is facing congestion or there is a potential for the network to be congested, therefore the sources should send at lower or minimum cell rate. In contrast, a value of 1 indicates that all links should be fully utilized. The explicit rate (ER) for each VC is calculated by multiplying LF with the link speed of that VC: ER = LF * Link-Speed (1) All the switches will maintain an ER value and update the value every N ABR cells are received. For every BRM cell travels through a switch, the switch will examine the ER field of that BRM cell. If the value in the BRM ER field is greater than the switch maintain ER value, the ER field in BRM cell is updated with the switch maintained ER value. If the value in BRM field in smaller, no action will be taken. After this stage, the BRM cell is forwarded to the next node until it reaches the appropriate source. All sources will adjust their data rate based on this ER value with the help of the CI and NI bit in the same BRM cell. The rules for source rate adjustment are given in table 1 [1]. Table 1. Source Rate Adjustments NI 0 0 1 1

CI 0 1 0 1

Action ACR ← Min(ER, ACR+RIF×PCR, PCR) ACR ← Min(ER, ACR-RDF×ACR) ACR ← Min(ER, ACR) ACR ← Min(ER, ACR-RDF×ACR)

As a summary, the pseudocode for the proposed algorithm is as below: while (online) if (receive ABR cell) if (queue_length < output_queue_size) add cell to buffer count ++ if (count % N == 0) link_fraction = NN(current_queue, previous_queue) ER = link_fraction * link_speed else drop cell if (schedule cell to link) if (cell is BRM cell) if(BRM.ER > ER) BRM.ER = ER *Note: NN is the function of Neural Network operation

690

3

K. Dimyati and C.O. Chow

Simulation Model

Fig. 2. Network Topology used for simulation and comparison study. It consists of five groups of VCs, where four groups are ABR connection and one group is CBR connection.

Fig. 2 is the topology used in this simulation. It consists of four groups of ABR VCs, named as group A, B, C and D, with three VCs each. Besides, it also contains four CBR VCs, which is named group X. There are four switches in the network and connected by three links, which are called Interlink 1, Interlink 2 and Interlink 3. All VCs are single hop connection, except VCs from group A, which are 3-hops connection. The ABR sources are set to 31Mbps, 93Mbps, 155Mbps, 217Mbps and 279Mbps respectively while the CBR is fixed at 31Mbps for all simulations. The main function of the CBR source is to occupy certain amount of bandwidth in Interlink 3 and observe its effects to this configuration. For the switch, the slot time is 155Mbps with buffer size of 1024 cells. There are two reasons for choosing small buffer size. First of all, it is the trend of switch's design to keep the buffer size to minimum. Besides, small buffer enable us to observe the congestion control scheme performance when minimum resources are available. The link between BTE and switch is set to 2km each with link speed of 155Mbps. The links between switches have speed of 155Mbps as well, but the distance is 10km for LAN and 100km for WAN. Each simulation runs for 500msec and the cells received for each receiver and cell loss in each switch are recorded. In this simulation, only two performance metrics are observed, that is the throughput and cell loss. Besides the proposed NIER algorithm, the above simulation is repeated by using two other well-known algorithms accepted by the ATM Forum, the NIST ER [3] and EPRCA schemes [5]. For the above algorithms, the default parameters are used in order to obtain their maximum performance [5][6]. For the proposed algorithm, the only parameter, i.e. the measurement interval (N), is set to 100 cells. This value is obtained through trial-and-error method in order to obtain maximum performance.

ABR Congestion Control in ATM Networks Using Neural Networks

4

691

Results and Discussions

Fig. 3 and 4 are the plots for throughput and cell loss for various switching schemes under the ATM LAN environment. It is clear that the NIER scheme gives the most superior performance in the ATM LAN with highest throughput and lowest cell loss. The total network throughput for the NIER scheme is about 10Mbps above the NIST ER scheme and 50Mbps better than the EPRCA. For cell loss ratio, the NIER scheme is less than 0.2% while both NIST ER scheme and EPRCA have cell loss ratio of 3% and 17% respectively. Fig. 5, 6 and 7 show the throughput for a representative from each group, except the CBR connection, for NIER scheme, NIST ER scheme and EPRCA respectively. From the topology, the link between switch 3 and 4 is shared by group A, D and X. Since group A and D are ABR connection, therefore a fixed amount of bandwidth is allocated to group X and the leftover bandwidth should be divided equally between group A and D. From the plot, it is clear that A1 and D1 are having the same throughput. Therefore, it is fair to say that the NIER scheme achieves the same fairness as presented by other algorithms. For the ATM WAN Environment, the plots for throughput and cell loss are presented in Fig. 8 and 9. The NIER scheme has a comparable performance with the NIST ER scheme. Both have throughput of about 300Mbps. In term of cell loss, the NIST ER scheme gives the best performance while the NIER scheme has cell loss of about 0.6%. The EPRCA still performs badly in the ATM WAN with throughput below 260Mbps and cell loss up to 18%. Same as the ATM LAN environment, all algorithms perform fairly. It is believed that the proposed algorithm can give better performance if the finetuning is carried out in order to achieve more suitable N. This is because by changing this parameter, the sensitivity of the algorithm towards the buffer's change will increase and for sure will provide better control for the traffic flow. Anyway, this task is not carried out in the simulation to maintain the fairness in the comparison study. In conclusion, it has been proven that NIER is a better algorithm as compared with the switching schemes used as it gives good performance in both LAN and WAN environments.

5

Properties of NIER Scheme

The following properties of the proposed NIER scheme are the main attractive features for implementing this switching scheme: • Efficiency: Simulations have shown that the proposed algorithm has high network throughput, high link utilization and low cell loss ratio. It has better performance than several existing switching schemes such as NIST ER and EPRCA. • Robustness: Simulation shows that no collapse in throughput even under severe load (change of source rate from low to high). Besides, the same neural network can be used under different environments with minimum parameter changes. • Simplicity: The implementation of the NIER scheme is simple because minimum parameter setting is involved and the step of calculation is straightforward. This greatly reduces the complexity in the switch design and construction.

692

• •



K. Dimyati and C.O. Chow

Scalability: The NIER scheme can operate in both ATM LAN and ATM WAN environment with modification only in one parameter that is measurement interval. Fairness: Fairness is achieved spontaneously without the need to keep track of the current individual cell rate. This is because the neural network gives output based on the current and previous queue length. Therefore, sources with the same conditions will be allocated the same resources. Response: Fast response is giving by the proposed NIER scheme. If there is no congestion, the network will achieve its PCR within very short time in both LAN and WAN topology. Also, when there is congestion in the network, it react faster than other schemes because it able to dramatically decrease the ACR.

Acknowledgements The authors would like to acknowledge the National Institute of Standard and Technology (NIST) for the uses of NIST ATM/HFC Simulator Version 4.1 in this paper.

References 1. 2. 3. 4. 5. 6. 7.

8. 9.

ATM Forum: Traffic Management Specification Version 4.1, AF-TM-0121.000, March 1999. A. A. Tarraf, I. W. Habib and T. N. Saadawi: Intelligence Traffic Control for ATM Broadband Networks, IEEE Communication Magazine, Volume: 33, issue 10, Page(s): 76 - 82, October 1995. J. L. Wang and L. T. Lee: Congestion Control Schemes for ATM Networks, Proceeding of IEEE Singapore International Conference on Network and Information Engineering, Page(s): 96 - 100, 1995. A. Koyama, L. Barolli, S. Mirza and S. Yokoyama: An adaptive rate-based congestion control scheme for ATM Networks, Proceeding of Information Networking, 1998. (ICOIN-12), 1998, Page(s): 14 -19 N. Golmie, Y. Saintillan and D. Su: ABR Switch Mechanisms: Design Issues and Performance Evaluation, Computer Networks and ISDN Systems, Volume 30, Page(s): 1749 - 1761, 1998. L. Robert: Enhanced PRCA (Proportional Rate-Control Algorithm), ATM Forum 94-0735R1, August 1994. N. J. H. Kotze and C. K. Pauw: The use of Neural Networks in ATM, Proceeding of the Communications and Signal Processing, 1997. Proceedings of the 1997 South African Symposium on Communications and Signal Processing, COMSIG '97, South African, Page(s): 115–119, 1987. A. Hiramatsu: ATM Communications Network Control by Neural Network, 1989 International Joint Conference on Neural Networks, ICJNN’89, Volume: 1, Page(s): 259-266, 1989. A. Tarraf, I. HabiB and T. Saadawi: Congestion Control Mechanism for ATM Networks Using Neural Networks, IEEE International Conference on Communications 1995, ICC '95 Seattle, Volume: 1 Page(s): 206–210, 1995.

ABR Congestion Control in ATM Networks Using Neural Networks

693

Fig. 3. Total Network Throughput for NIER, NIST ER and EPRCA schemes under ATM LAN environment. It can be observed that NIER gives the highest throughput. The NIST ER scheme is a bit lower while EPRCA performs badly.

Fig. 4. Total Network Cell Loss for NIER, NIST ER and EPRCA schemes under ATM LAN environment. It can be observed that cell loss seldom occur in the network when NIER scheme is used. The NIST ER scheme also has low cell loss. The cell loss ratio is very high if the EPRCA scheme is used.

694

K. Dimyati and C.O. Chow

Fig. 5. Figure shows throughput for each VC using NIER scheme under ATM LAN. It shows that A1 and D1 are having the same throughput while B1 and C1 are identical.

Fig. 6. Figure shows throughput for each VC using NIST ER scheme under ATM LAN. It shows that A1 and D1 are having the same throughput while B1 and C1 are identical.

Fig. 7. Figure shows throughput for each VC using EPRCA scheme under ATM LAN. It shows that A1 and D1 are having the same throughput while B1 and C1 are identical.

ABR Congestion Control in ATM Networks Using Neural Networks

695

Fig. 8. Total Network Throughput for NIER, NIST ER and EPRCA schemes under ATM WAN environment. It can be observed that NIER and NIST ER are having very high throughput while EPRCA still performs badly.

Fig. 9. Total Network Cell Loss for NIER, NIST ER and EPRCA schemes under ATM WAN environment. It can be observed that there is no cell loss when the NIST ER scheme is used. When the NIER scheme is used, there cell loss ratio is very low but it is very high when the EPRCA scheme is used.

696

K. Dimyati and C.O. Chow

Fig. 10. Figure shows throughput for each VC using NIER scheme under ATM WAN. It shows that A1 and D1 are having the same throughput while B1 and C1 are identical.

Fig. 11. Figure shows throughput for each VC using NIST ER scheme under ATM WAN. It shows that A1 and D1 are having the same throughput while B1 and C1 are identical.

Fig. 12. Figure shows throughput for each VC using EPRCA scheme under ATM WAN. It shows that A1 and D1 are having the same throughput while B1 and C1 are identical.

An Architecture for the Transport of IP Telephony Services Sidnei Guerra, Joan Vinyes, and David Fernández Department of Telematic Systems Engineering, Technical University of Madrid, ETSI Telecomunicación, Ciudad Universitaria s/n, 28040 Madrid, Spain. Tel: +34 (91) 336.7939. Fax: +34 (91) 3367333. {guerra, vinyes, david}@dit.upm.es

Abstract. The transport infrastructure to VoIP traffic is moving toward a multiple service platform of high-speed routers interconnected by optical network SDH/WDM. A multiple-service network allows operators to attend to clients through optimization of resources, differentiated quality of service and traffic engineering. This article describes a scalable architecture for the transport of IP telephony services based on MPLS and DiffServ as complementary solutions to provide QoS in access, collector portion, and core of the network. This work presents the state of the art of the protocols related with quality of service, routing and traffic engineering in the IP Telephony field. First we examine the network elements and their functionality inside each protocol, with a focus on the environment of the two workgroups, ITU-T and IETF. Finally we discuss the necessary changes for the introduction of MPLS (Multi Protocol Label Switching) as a significant strategy for the transport of IP telephony services, due to its capacity to emulate the orientation to connection provided by ATM technology. Moreover it offers scalability, low cost, and the possibility of automatization of several aspects of the traffic engineering function - such as the bearer capacity for VoIP, thereby providing more predictable, and even constrained QoS.

1

Introduction

In the evolution toward a network of multiple services there is a need to optimize and organize the traffic in order to respond to the congestion and changes in the traffic model. This is only possible through traffic engineering, which has ended up being an indispensable function in large IP based systems. The keys of the benefits associated with the use of traffic engineering techniques provide to network operators mechanisms to control and orientation of the traffics inside their networks, improving the efficiency in the use of network resources, as well as improving the quality of service offered to traffic flows. For example, in the case of VoIP traffics services, traffic engineering allows a better treatment of traffics inside the network, differentiating them from other traffics and offering them the required service levels in terms of packet looses, delays, throughputs, etc. Traditional networks based on the use of classical dynamic routing protocols, such as OSPF or IS-IS, do not allow a tight control of traffics inside the network, mainly because they are based on shortest path algorithms. That makes difficult to exert an P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 697–706, 2001 © Springer-Verlag Berlin Heidelberg 2001

698

S. Guerra, J. Vinyes, and D. Fernández

effective control on the network behavior, since the whole traffic has followed the best route. On the other hand, a model that leans on ATM technology as transport technology is a powerful solution that would allow a good control over network flows and applications, but it would present scalability problems and overhead for the support of IP based services. Besides, traditional networks have serious problems when trying to satisfy all the quality of service requirements demanded by the real time applications, like IP telephony based on H.323 or SIP. They lacks mechanisms necessary to guarantee for each traffic the conditions of their demand, making the applications unusable in case of congestion problems. Typically, networks used nowadays to support real time traffics are overdimensioned to avoid congestion and satisfy the minimum QoS requirements of applications. But that solution is expensive in terms of the number of resources used, and does not scale well. Considering these conditions and the related above problems, the IETF - through their workgroups, presents some scalable solutions among which Differentiated Services (DiffServ) and Multi Protocol Label Switching (MPLS). DiffServ [4] model is one of the main proposals to add QoS support to IP networks. It is based on the use of the formerly named Type of Service (ToS) field in the IP header (which has been renamed to Diffserv Code Point, DSCP), to allow different treatments or priorities among traffics going through the network. It is an scalable proposal that bases its scalability on the aggregation of individual flows to aggregated flows at the edge of DiffServ backbones. However, DiffServ does not offer traffic engineering capabilities, as it does not modify or interact with network routing - diverse network flows to the same destination can get different treatment by routers, but they all go through the same path. MPLS [20] is an emerging standard that makes use of fixed size labels inserted before IP packets to classify and route differentiate traffics inside a network. MPLS uses mechanisms similar to the ones used in DiffServ to aggregate traffic at the edge of the network, but it adds new traffic engineering capabilities, making possible to reroute traffics to the same destination using different paths, allowing a more efficient use of network resources. DiffServ and MPLS are not exclusive solutions. In fact, they can be properly combined to be a serious alternative for the transport of VoIP traffics in the public networks of Operators and ISPs. In our view, the combination DiffServ-MPLS has as main advantages the MPLS capacities for the traffic engineering and the flexibility of DiffServ for the user management with the different class of service. It is important to clarify the fact that the field that identifies the Quality of Service goes separated from the label which identifies the flow. This allows to apply different treatments at level of priorities to packets with oneself label (same FEC) but with different levels of quality. This has great utility when oneself segment of LSP transports flows of different qualities. In this case, it is not necessary to have identified the individual flows explicitly to offer them different services. An IP network that uses MPLS for the encapsulation of the voice is given as Voice/RTP/UDP/IP/MPLS. The header compression techniques used increase those that are already defined in [7] and [5], providing extra capacity to compress multiple labels of the type MPLS. Also, the same ones can coexist with other compression standard that is executed on oneself connection (IP, IP/TCP and IP/UDP/RTP). This allows the creation of LSPs that can transport the voice in an efficient way, because these very LSPs support the multiplexing of multiple channels.

An Architecture for the Transport of IP Telephony Services

699

A reference model that uses MPLS for routing the voice over IP traffic includes a PSTN to IP interworking function and an IP to MPLS interworking function, which provides more predictability; that is to say, IP QoS bearer control through the use of LSP (Label-Switched Path). This interworking function may be implemented in the same physical device or as separate devices. For the policy model this architecture need a management layer to define and control the available network resources to a particular session or groups of sessions. The PDPs (Policy Decision Points) perform a bandwidth management function to determine whether a session may be accepted and if so it's optimal route.

2

Background

Two divergent points of view exist over the definition of the IP Telephony, one as a technology and the other as a service concept. In the first case the public Internet is used to interconnect different users but without guarantees and quality of service control. Basically the user has an access best effort to connect PC-to-PC or PC-toservers through programs of gratuitous distribution. In this case the quality of the communication depends on the user's connection. In the second concept the voice over IP has more than enough it is viewed as a service of added value where the voice traffic travels over IP networks as well as over the public Internet. From that point of view it is necessary that the operators/ISPs define some priorities for the supply of IP Telephony service keeping in mind the following important factors [15]: • The type of service or application that is being offered. • Whether it is a new entrant or incumbent operator that is offering the service. • The tariff structure of the incumbent operator, especially for access to the local loop. • Whether or not proportionate return of traffic is a regulatory requirement on international routes. For the operators and service providers it is already a reality that the growth of the data traffic is putting on above the voice traffic and that in the next future the routers and IP networks will find the necessary scalability to provide quality of service for the telecommunication networks. That phenomenon provides a true change in the current scenario of the telecommunications that during many years used the technology TDM (Time-Division Multiplexing) to build the networks, and that at the moment change to based network on the packets switch system. Besides, the fact that all that supposes a simplification of the network physical structure and the operational costs and equipment reduction. However, the complexity of the current networks and the problems related to the quality of service in the IP networks hinders the quantification of these potential benefits. This paper contributes to the construction of news telecommunications networks based on packets, proposing a scalable architecture for the transport of IP Telephony services based on emergent technologies- such as MPLS and DiffServ, as complementary solutions to provide quality of service in the core as well as access network. The main idea is centralized in introducing a multi-layer concept in the IP world [Figure 1] to differentiate the services and its quality levels. Thus, the IP network can

700

S. Guerra, J. Vinyes, and D. Fernández

be represented as a set of layers of different priorities easing the task of planning and engineering. Taking as configuration an example give in [13] where a backbone supports three different classes of services: 1. Real time class 2. Committed bandwidth class 3. Best effort Applying the multi-layer model to IP backbone, this can be divided in three different layers, where it is considered that each layer has a specified type of service and that its treatment will depend on priority when transporting over the network.

MPLS

Voice Traffic

Reserved Data Traffic

IP World

Best Effort

Transport Network SDH/WDM

Fig. 1. Multilayer concept in the IP World

In this case, MPLS technology is used for voice treatment - which belongs to the real time class, thus allowing explicit routing of packets by putting labels on them, which can then be used to forward packets along specific Label Switched Paths (LSPs). A label switched path requires a type of set up, meaning that all the intermediate routers between the ingress and egress node are specified. The route selection refers to the method used for selecting the LSP for a particular FEC. For this case, it is considered an explicit routing, so the sequence of LSRs followed by an explicitly routed LSP may be chosen by a static model, or may be selected dynamically by a single node. For example, the egress node may make use of the topological information learned from a link state database in order to compute the entire path for the tree ending at that egress node [20]. In particular, the voice traffic can be seen as a multicommodity flow problem [1] where the routing can be determined by an off-line model taking for base estimated traffic of the traditional circuit network. This model uses an external routing server that searches a feasible routing for the voice traffic compared to other types of traffic with smaller priority. The model consists in using mixed integer programming to solve, in a feasible manner, a multicommodity flow problem, where each commodity corresponds to an IP voice

An Architecture for the Transport of IP Telephony Services

701

call. For it is necessary to consider a voice traffic behavior of the traditional circuit network to estimate an initial traffic matrix among the nodes of the packet network. The result is a Virtual Voice Network (VVN) [Figure 2] with a level of quality that allows to offer service to an initial traffic profile. However, the network planning and traffic engineering for this case are generally complex tasks that require significant understanding about the underlying networking capability on the part of the network planner. A key attribute of a manageable networking environment is one where complexity is minimized. In that sense the VVN considers the Constraint-based Routing Label Distribution Protocol (CR-LDP), proposed by IETF, as online control protocol because the CR-LDP signaling allows the specification of traffic parameters to express the packet treatment at each node, also known as Per-Hop Behaviors (PHBs), for each differentiated service. It is this capability and the rules enforced at the edge that provide a powerful and flexible QoS support for end-to-end differentiated services.

Voice LSR

INGRESS LER

Voice LSR

EGRESS LER

Fig. 2. Virtual Voice Network

These different services can be implemented in edge routers (traffic concentrators) using a field in the head of the IP packet to select the quality level that will be applied to the packets. The differentiated services enhancements to the Internet protocol are intended to enable scalable service discrimination in the Internet without the need for Per-flow State and signaling at every hop [4]. The differentiated service architecture is based on a simple model where traffic entering a network is classified and possibly conditioned at the boundaries of the network, and assigned to different behavior aggregates. Each behavior aggregate is identified by a single DS codepoint. Within the core of the network, packets are forwarded according to the per-hop behavior associated with the DS codepoint. DiffServ uses a 6-bit header field, the DS-field. In IPv4 the TOS octet and in IPv6 the Traffic Class octet [6] acts as the DS-field. Even though the usage of TOS and Traffic Class octets are different from the usage of DS-field, the differences are such that deployment of DiffServ does not cause serious impacts on existing applications. The requirements or rules of each service must be set through administrative policy mechanisms, for example COPS [10]. A differentiated services compliant network

702

S. Guerra, J. Vinyes, and D. Fernández

node includes a classifier that selects packets based on the value of the DS field, along with buffer management and packet scheduling mechanisms capable of delivering the specific packet forwarding treatment indicated by the DS field value. A replacement header field, called the DS field, is defined, which is intended to supersede the existing definitions of the IPv4 TOS octet and the IPv6 Traffic Class octet. Six bits of the DS field are used as a codepoint (DSCP) to select the Per-Hop Behavior) a packet experience at each node. A two-bit currently unused (CU) field is reserved. An edge router, for example, may be configured so that it can be used to control how packets are scheduled onto an output interface [18]. There are several packet queuing mechanisms that can be utilized in determined nodes of the network as implementation of PHBs. What they all have in common is that the incoming packets are written into a queue, then the packets are read from the queue in some order and placed in the egress interfaces, possibly discarding excess packets. Some manufactures are using Weighted Fair Queuing (WFQ) as a scheduling algorithms that exhibit selective prioritization properties.

3

Virtual Voice Network Model

The Virtual Voice Network (VVN) Model is represented as a subgraph Gv⊂G, where the graph G=(R, E) has R as a set of routers and E as a set of links, each of which has capacity Cij (Kbits/sec). V is a subset of routers that is assumed as ingress-egress routers or voice routers of the VVN, between which labels switched path (LSP) can be set up. B represents a set of border routers (edge routers), where B⊂R. Let D be a traffic demand in that an entry dij represents the aggregated bandwidth request for voice traffic from i to j, ∀(i, j)∈B, we assume that D considers voice traffic behavior of the circuit traditional network on the busy hour traffic that the trunk group is offered. Given an offline sequence of LSP set up requests, it is NP-Hard to determine what is the maximum number of voice call requests that can be simultaneously routed in the network [14]. Due to the complex nature of the model, an optimization problem formulation is used as a multi-commodity flow problem that is solved by an offline server. The general model of the routing problem can be formulated as the following linear program: Min β =



d ij

X ij , ∀(i, j )∈ E , ∀d ∈ D

(1)

Subject to

∑f

d ij

d



≤ (Cij − α ij )X ij , ∀(i, j )∈ E

f (dj ,i ) −

(i , j )∈E

 D(d ,i ) , ∀i ∈ B f (id, j ) =  ∑ (i , j )∈E 0, ∀i ∈ V

(2)

(3)

An Architecture for the Transport of IP Telephony Services

703

X ij ∈ {0,1}, ∀(i, j )∈ E

(4)

f ijd ≥ 0

(5)

The result of that model is a virtual network dedicated to the voice packet traffic over the network core (MPLS). The VVN allows solving the traffic-engineering problem through an offline model of optimization that simplifies the task of the online routing algorithms. After the optimization, with a feasible result it is possible to apply shortest path algorithm in the virtual network to reroute the labels, utilizing CR-LDP like protocol of control. Constraint-based Routing Label Distribution Protocol (CRLDP) is a simple, scalable, open, non-proprietary, traffic engineering signaling protocol for MPLS IP networks. It is based in a generic label distribution protocol that uses TCP (Transmission Control Protocol) to maintain signaling sessions between the LSRs and exchange messages. Due to the dynamic characteristics of the problem, the model adds a reserve coefficient αij in the capacity restriction of the connection between i and j, in this way, it is possible to absorb variations of the traffic allowing a slack capacity in the virtual network. With this coefficient the virtual network is dimensioned considering only one part of total link capacity. For example, an operator can to reserve only 80% of link capacity to the aggregated voice traffic. The virtual voice network model can also be expanded to interconnect other secondary networks of the same operator, different operators or ISPs, allowing policy of interconnection among different networks for the negotiation of minimum quality levels for voice traffic routing [Figure 3].

LER

VVN TELECOM 1 LER

VVN ISP A LER

VVN TELECOM 2

Fig. 3. Connectivity between VVNs

LER

VVN ISP B

704

4

S. Guerra, J. Vinyes, and D. Fernández

Study Methodology

The study network consists of a routing server meant to resolve all network complexity with respect to the traffic engineering. The communication between the routing server and network elements (routers) for configuration of the routing tables utilizes the protocol COPS-PR (COPS Usage for Policy Provisioning) proposed by IETF. The control policy specification determines the access to network resources and is based on the approaches established by the operator. The policy architecture used establishes that each domain has a routing server. This server solves the problem of optimization, and then the result of the model is stored in a database with the explicit routes that determine the VVN. In this architecture the management system is free to change the LSPs determined by the model or to add backup tunnels for the case of network failure. V oice dem and m atrix betw een edges

Profile of the circuit network

A ggregated traffic betw een edge routers Solver the optim ization problem

M ulti-com m odity flow problem

V irtual V oice Netw ork

Feasible solution

Initial configuration

D istribute LSR

Fig. 4. Routing Server Procedure

Using the provisioning model of COPS-PR and separate data model allow to isolate the details of the label distribution mechanism in the data model. The LSR notifies the PDP of the label distribution mechanism it supports, for example by advertising its capabilities to the PDP, and the PDP provides decisions including the parameters needed by that mechanism. The LSR then uses the data to initiate the tunnel with whichever mechanism it supports. This also makes it easier to expand support for new traffic engineering features that may be added to MPLS in the future, by updating just the data model and not the protocol [19]. The Figure 4 shows the methodology used by routing server to establish an initial VVN.

5

Conclusion

This article presents an infrastructure that makes possible to solve the optimization problem through a static model that reduces complexity of the dynamic traffic management, allowing that set of procedure and policies to ensure that network congestion is minimized and controlled.

An Architecture for the Transport of IP Telephony Services

705

The connectivity model with other networks may be further expanded to support multiple core MPLS domains. In this case, the access domains may be provided by the ISDN, requiring a TDM to packet interworking function at the gateway to the core MPLS. Due to the fact that the optimal solution to the optimization problem is computationally expensive, heuristics can be used to obtain suboptimal solutions for the virtual voice network. Finally, this solution can be extended for use in optical network. These extensions include information pertaining to the support of multiple layers, diverse routing support, and resource utilization. In this case, other features must be introduced, such as support for bidirectional and backup paths, and fault tolerance. Acknowledgments We would like to thank PISCIS (2FD97-1003-C03-01 FEDER-CICYT Program) Project for its support to this work.

References 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16.

Ahuja, R., Magnanti, T., Orlin J.: Network Flows: Theory, Algorithms, and Applications. Prentice Hall, 1993. Awduche, D., et al.: Requirements for Traffic Engineering Over MPLS. RFC 2702, September 1999. Bhaniramka, P., Sun, W., Jain, R.: Quality of Service using Traffic Engineering over MPLS: An Analysis. Internet Draft, draft -bhani-mpls-te-anal-00.txt, March 1999. Blake, S., et al.: An Architecture for Differentiated Services. RFC 2475, December 1998. Casner, S. et al.: Compressing IP/UDP/RTP Headers for Low-Speed Serial Links. RFC 2508, February 1999. Deering, S. et al.: Internet Protocol, Version 6 (IPv6) Specification. RFC 2460, December 1998. Degermark, M. et al.: IP Header Compression. RFC 2507, February 1999. Doverspike, R., Phillips, S., Westbrook, J.: Future Transport Network Architecture. IEEE Communications Magazine, 1999. Doverspike, R., Phillips, S., Westbrook, J.: Transport Network Architecture in an IP World. IEEE INFOCOM 2000, Tel Aviv, Israel. March 26-30, 2000. Durham, D. et al.: The COPS (Common Open Policy Service) Protocol. RFC 2748, January 2000. Faucheur, F. et al.: MPLS Support of Differentiated Services. Internet Draft, Internet Engineering Task Force, February 2001, Work in progress. Gleeson, B. et al.: A Framework for IP Based Virtual Private Networks. RFC 2764, February 2000. Hersent, O., Gurle, D., Petit, J.: IP Telephony: Packet-based multimedia communications systems. Addison Wesley, 2000. Horowitz, E., Sahni, S.: Fundamentals of Computer Algorithms. Computer Science Press, 1978. International Telecommunications Union. IP Telephony Workshop, Geneva, 14-16 June 2000. Kankkuene, A. et al.: VoIP over MPLS Framework. Internet Draft, Internet Engineering Task Force, July 2000.

706

S. Guerra, J. Vinyes, and D. Fernández

17. Kodialam, M., Lakshman, T.: Minimum Interference Routing with Applications to MPLS Traffic Engineering. IEEE INFOCOM 2000, Tel Aviv, Israel. March 26-30, 2000. 18. Nichols, K. et al.: Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers. RFC 2474, December 1998. 19. Reichmeyer, F. et al.: COPS Usage for MPLS/Traffic Engineering. Internet Draft, Internet Engineering Task Force, July 2000. 20. Rosen, E. et al.: Multiprotocol Label Switching Architecture. RFC 3031, January 2000.

Architectural Framework for Using Java Servlets in a SIP Environment Roch Glitho, Riad Hamadi, and Robert Huie Ericsson Research Canada 8400 Decarie Blvd, Mount Royal, H4P 2N2, QC, Canada {lmcrogl, lmcriha, lmcrohu}@lmc.ericsson.se

Abstract. Internet telephony services enable a wealth of services. One of the important questions in engineering services is how to create the services. Another question is where to execute the services. This paper proposes a javaoriented solution to create services and also a new software component, which is able to control their execution.

1

Introduction

Internet telephony enables a wealth of services. It is critical to provide a means for creating, deploying and executing these services. It should not be necessary to add a new network element for each service. In addition, it should be easy for a third party to create new services. This paper proposes an approach based on Java servlets for creating and executing services. It introduces new components that can be added to a SIP model to control services. In addition it proposes an Application Programming Interface (API) that offers the possibility to create services with a high level of abstraction of SIP. In this paper, we propose a new approach based on Java servlets for creating and executing services. The first section gives background information and examines the related work. The section after that gives a system view of our architecture. The last section presents the servlet API we propose for service creation and also an example of implementation of a service using API.

2

Background and Related Work

There is a strong connection between service engineering and the signaling protocols that are used in the network. In this paper we focus on services engineering in SIP environment. SIP is based on a request-response model. It uses simple messages composed by headers to describe the session and by a body to describe the media. Proxy, redirect servers, registrar servers, and user agent (a client and a server) are the key components used in a SIP environment [5]. In order to engineer services in a SIP environment, a logic [4] is added to the protocol to control services. When a proxy, a redirect server or a user agent receives a request, the stack parses it, and then it sends the information to the service logic who P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 707–716, 2001 © Springer-Verlag Berlin Heidelberg 2001

708

R. Glitho, R. Hamadi, and R. Huie

decides which service to execute. Answers to the questions below will allow us to better understand the process in the specific context of Java servlets. It will also allow us to examine the related work. • How to create the services? • Where do the services reside? • Where are the services executed? 2.1

Service Creation

Several approaches have been proposed to create services in a SIP environment using Java servlet APIs. Some of them extend the generic Java servlet API [1], [6] while others propose the use of Java servlets APIs developed from scratch [3]. Extended Generic Servlet API This approach is similar to the one of HTTP servlet API [6]. It defines a SipServlet class from the generic class GeneriServlet of Java API, Fig 1. The API proposes a SipServletRequest class, which is an extension of the ServletRequest. SipServletRequest defines access to headers of a SIP request. The API defines too a SipServletResponse class which is an extension of the ServletResponse class of the generic API. SipServletResponse defines access to the headers of a SIP response. If the proposed API has the advantage to use the Java generic servlet classes, it presents the following disadvantages: • The API presents a class redundancy. We know that requests and responses in SIP are defined by different type of headers [2]. Request headers, response headers. Entity and general header that can defined in a request or in a SIP response. General and entity headers access is redundant because, SipServletRequest and SipServletResponse classes duplicate the implementation of there methods. • Another disadvantage of the API is the difficulty to be used in a proxy server for the reason that the API that not offer the possibility to fork or to forward SIP messages. IETF Servlet API The proposed servlet API [3] is designed from scratch. The advantage of this API is that can be used by a user agent, in addition to redirect server, and a proxy server. It defines architecture of classes based on a good understanding and a good use of SIP model (i.e. SipRequest, SipUrlAddress). But, it does not offer a high level of abstraction for creating services, for example by offering access to databases (i.e. ContactDataBase). 2.2

Service Location and Execution

Services can reside either on the servers themselves or in other hosts. When services and servers co-reside, a simple API allows service execution. When services and servers are not in the same host, other protocol interfaces allow the execution of services, such as RPC, CORBA, or DCOM.

Architectural Framework for Using Java Servlets in a SIP Environment

709

Servlet

ServletRequest

ServletResponse

GenericServlet

javax.servlet

javax.servlet.sip

SipServlet

SipServletRequest

SipServletResponse servlets

Fig. 1. SipServlet API

When the server receives requests such as an INVITE message, it invokes the service to be executed. The service can be active for the duration of the call or it can be controlled by the server who has some means to specify the points when a service starts its execution and when it is destroyed. The server loads the service from a repository on its processor to run it locally. This approach gives the server, the functionality to control services and run them in addition to call processing.

3

System View of the Novel Architecture

The proposed architecture uses a SIP server/client, a policy server, a user profile, a servlet engine, and servlet repositories, Fig 2. The approach isolates the call processing to a SIP server and the service execution to a servlet engine. In addition this architecture allows a flexibility of creating services by offering a Java API. Services can be located outside the SIP servers. UAS policy server

UAS Parser

Servlet Engine

Servlet Repository

Req

Servlet loading Req

Modified Req

Fig. 2. The scenario used by the architecture to process a received request and loading a service

710

R. Glitho, R. Hamadi, and R. Huie

Before presenting in details our architecture, let us give some definitions. • The User profile is a database that represents a set of rules defined by users in order to establish relationships between services and SIP messages. A relation is defined between services identifiers and fields’ values of SIP messages. If no relationship is defined between fields of the received request and services, then the policy server cannot invoke services for the received SIP message. • A policy server is the software component that uses rules of the user profile to take the decision to execute services or not when receiving SIP messages. • A servlet repository is the host that contains SIP servlets. • Servlet engine is the software component that executes services. 3.1

Policy Server

When a SIP Server receives a SIP request, the parser checks the correctness of the message. It processes the header fields of the request that describe the session, and the body of the request that describes the individual media. To take the decision of what to do with the received request (invoking services or not), we propose to integrate a policy server to SIP servers, Fig 3. The policy server analyses the received message and decides if services can be executed for the received SIP message. To take the decision, the policy server refers to a user profile, Fig 4. The policy server tries to instantiate rules of the user profile by fields’ values of the received message. If an instantiation appears, the policy server identifies the services to execute for the received SIP message.

Request (R)

UAS Parser

Response

User Profile

Policy server

Fig. 3. Architecture of the user agent server

After the policy server identifies the service to execute, it modifies the received SIP request. It adds the identifier(s) of invoked service(s) in the received SIP message. An extension of SIP is proposed to add the service identifier. It consists of creating a new header ServiceRequest in SIP messages: ServiceRequest (service1,…, serviceN). Parameters service1…serviceN of ServiceRequest header are identifiers of invoked services.

Architectural Framework for Using Java Servlets in a SIP Environment

711

INVITE sip:[email protected] SIP/2.0 … from:sip:[email protected]

Policy Server User Profile

if (from == [email protected]) email_notification if (from == [email protected]) prepaid Fig. 4. Policy server and user profile communication

After this, the server forwards the modified SIP message to the servlet engine that downloads and executes invoked services. 3.2

Servlet Engine

A servlet engine is the software component composed by a sip-stack and by a servlet processor, The sip-stack sends, receives and processes SIP messages, and the servlet processor loads and controls the execution of services, Fig 5. When the servlet engine receives a SIP message, the sip-stack parses it to check the correctness of the message and gets the identifier(s) of the service(s) to execute from the ServiceRequest header of the message. Identifier(s) is (are) sent via a sip-stack API to the servlet processor, Fig 5. The servlet processor finds the location of the service to execute, loads it from its servlet repository using an HTTP protocol [6], and then executes the service. The execution of a service is done in three steps: • Initialization of the service. • Execution of service. • Destruction of the service. To control the execution of services, the servlet engine uses a Servlet API, Fig 5. For example, to initialize a SIP servlet it invokes init() method of the servlet. The execution of the service depends on the method of the received message. To each SIP method corresponds a method in servlet API. For example, if an INVITE request is received, doInvite() method of the service is executed.

712

R. Glitho, R. Hamadi, and R. Huie

servlet

ServletAPI

Servlet Engine

Sip-stack API

Sip Stack

SDP Parser

SIP Parser

Fig. 5. Servlet engine architecture

Two architectures are proposed for servlet engine. In the first architecture the servlet engine is located in the same host as the server. This architecture is used especially to execute services created on a UAS. In the second architecture, the servlet engine is an independent component (node) in the network and can be used by different servers such as proxy servers. This architecture is used to execute services created for proxy servers. If this architecture requires us to work on the communication security between the servlet engine and the server, and between servlet engine and servlet repository, it provides us with the following advantages: 1. The same servlet engine can be connected to many servers and many servlet repositories. 2. This approach centralizes service execution. Services can be executed on a same servlet engine.

4

Servlet API

This section presents a general description of the servlet API used in our architecture to built and to control the execution of services. The API offers a high level of abstraction and offers flexibility to SIP servlet developers to create services on proxy, redirect or UA.

Architectural Framework for Using Java Servlets in a SIP Environment

713

The API is a specialization (extension) of the generic servlet package javax.servlet. We define a SipServlet class that implements the generic servlet interface. Each created service must specialize SipServlet class, Fig 6. SipServlet handles a received message via the generic method service(sipRequest,sipResponse). This method dispatches received messages to the correct method doInvite(), doBye(), doCancel(), … of the servlet depending on the information received in the request message. The API offers the common interface SipMessage that provides access to entity and general headers of a SIP messages [2]. This interface is specialized to a SIP request SipRequest, and to a SIP response SipResponse, Fig 6. SipRequest class provides access to request headers such as the contact header. In addition This call allows the possibility to create and to send a requests to a specific server at a specific address. For example to send or forwards a message to a SIP server, the servlet uses the method send(sipUrlAddress). SipResponse provides access to response headers and information about the response, such the description of the received response getResponseDescription() or the status of the response; getStatus(). In addition SipResponse interface allows sending responses to the caller. Servlet

ServletRequest

ServletResponse GenericServlet

javax.servlet javax.servlet.sip

SipServlet

Servlet2

Servlet1

SipMessage

SipRequest

SipResponse

Fig. 6. SIP servlet API package

Each developed servlet using the API has to implement a set of methods. At first each servlet extends the SipServlet class. A set of the methods to implement is proposed: • doInvite() in response to received INVITE message. • doBye() in responses to received BYE message. • doCancel() in response to received CANCEL message. In addition, implementation of these methods allows the use of other methods of the API implemented by the servlet engine. For example the implementation of the

714

R. Glitho, R. Hamadi, and R. Huie

doInvite() method can need the use of the getFrom() or getTo() methods that gets the values of from and to headers.

5

Prototype

We show here an example of a SIP servlet created using the proposed API. The personalized voice service plays specific message to each caller. For example if Robert who is calling, a message msg1 is played, but if it is Joe who is calling, a message msg2 is played, in addition to an e-mail that it is to Joe. Bellow is the implementation of doInvite() method of the service. public void doInvite(SipServletRequest req, SipServletResponse res) { . . . String fromget = req.getFrom().getAddress(); System.out.println("THE GET ADDRESS:"+fromget); String receivedfrom = fromget.substring(fromget.lastIndexOf('/')+1,from get.lastIndexOf(':')); if (req == null) String sender = "Who: "+req.getFrom().getAddress()+'\n'; String calltime = "When: "+getTimeStamp2(); . . . try { FileWriter fw = new FileWriter(filePrefix + ".txt"); fw.write(sender, 0, sender.length()); fw.write(calltime,0,calltime.length()); fw.flush(); fw.close(); } catch (IOException e) {. . . } if (receivedfile != null){ try { DataInputStream dataInput = new DataInputStream( new BufferedInputStream( new FileInputStream("C:/Media/mailconfig.txt"))); try { while (dataInput.available() != 0) { String s= dataInput.readLine(); registeredCaller=s.substring(0,s.lastIndexOf('=')); if ((registeredCaller.equals(receivedfrom)) && (receivedfile != null)) { mailTo = s.substring(s.lastIndexOf('=')+1); } } } catch (IOException e) {} } catch (FileNotFoundException e) {} sendfile(mailTo,mailFrom,SMTPsvr,subject,msgText, receivedfile, true); } else sendfile(mailTo,mailFrom,SMTPsvr,subject,msgText, filePrefix+".txt", true); }

The servlet engine that controls its execution loads this servlet. The servlet engine (ServletEngine class) invokes doInvite() method of the service in response to the INVITE received message. Before it starts the execution of services, the servlet engine initialises its SIP stack, then the listener of the stack processes the request and loads the service, (processRequest method).

Architectural Framework for Using Java Servlets in a SIP Environment

715

public ServletEngine(String _user, String _hostname, int _port1, int _port2) { if (_port1 < 0) _port1 = 6060; m_sipStack = new JainSipStackImpl(); m_sipStack.setStackName("Servlet Engine Stack"); try{ m_listeningPoint = new ListeningPoint(InetAddress.getByName(_hostName),_port1); } catch (UnknownHostException e) { . . . } try { m_provider = m_sipStack.createProvider(m_listeningPoint); } catch (IPPeerUnavailableException e) {} catch (ListeningPointUnavailableException e) {. . .} m_listener = new JainSipListenerImpl(m_sipStack, m_provider, this); try {m_provider.addJainSipListener(m_listener); } catch (TooManyListenersException e) {. . . } catch (IPListenerAlreadyRegisteredException e) {. . . } } public void processRequest(RequestMessage _request, int _transactionId) { SipParseInfo message = null; SessionDescription body = null; InputStream btmp; String servletIdf=null; SipServletRequest aSipRequest=null; String classname=null; String method = _request.getMethod(); byte[] tmpBody=null; // checks if receives an INVITE SIP message. if (method.equals(InviteMessage.method)) { try { tmpBody = _request.getBody(); } catch (BodyNotSetException e) {} btmp = new ByteArrayInputStream(tmpBody); sdpParser.ReInit(btmp); body = new SessionDescription(); try { sdpParser.session_description(body); } catch (ParseException e) { body = null; } catch (TokenMgrError e) { body = null; } // gets the idf of the invoked service. servletIdf = body.sessionInfo; classname = servletIdf.substring(0,servletIdf.lastIndexOf(".class"));} try { ServletLoader aLoader = new ServletLoader(); // loads the servlet Class ServletClass = aLoader.myload(classname,aLoader); SipServlet svl; svl = (SipServlet) ServletClass.newInstance(); svl.init(); // initialize the servlet SipServletRequest aSipServletRequest=null; aSipServletRequest = new SipRequestImpl(this,_request, m_servletEngine); // invokes doInvite method because receives INVITE message svl.doInvite(aSipServletRequest,null); } catch (Exception e) { . . } }

716

6

R. Glitho, R. Hamadi, and R. Huie

Conclusion

The architecture offers the following advantages: • Separates the service control and session processing • Isolates the execution of services on servlet engine host. • Offers the possibility to service providers to create services on different hosts. However, we are still looking in the communication mechanisms between servers and servlet engine. Some of the issues that need to be addressed are: • The number of servers that can be connected to a same servlet engines. • The possibility to execute services simultaneously by the same servlet engine.

References 1. 2. 3. 4. 5.

6.

Ajay P. Deo, Kelvin R. Porter, Mark X. Johnson: Java SIP Servlet API Specification. MCI Worldcom, April 27, 2000. M. Handley, H. Schulzinne, E. Schooler, J. Rosenberg: Session Initiation Protocol. RFC 2534, IETF 1999. A. Kristensen, A. Byttner: The Sip Servlet API, Internal Draft, IETF 1999 (work in progress) J. Rosenberg, J. Lennox, H. Schulzrinne: Programming Internet Telephony Services. IEEE Network, May/June 1999, Vol. 13 No. 13, 42- 48. H. Schulzrinne, J. Rosenberg: The session Initiation Protocol: InternetCentric Signalling. IEEE Communication Magazine, October 2000, 134140. Werner Van Leekwijck, Dirk Brouns:Siplets: Java-based Service Programming for IP telephony, ICIN 2000, 22-27.

A Practical Solution for Delivering Voice over IP 1

Stanislav Milanovic and Zoran Petrovic 1

2

Serco Group plc, Via Sciadonna 24/26, 00044 Frascati (RM), Italy [email protected] 2 University of Belgrade, Faculty of Electrical Engineering, Bulevar Kralja Aleksandra 73, 11000 Belgrade, Yugoslavia [email protected]

Abstract. This paper describes a practical deployment of the VoIP (Voice over Internet Protocol) in the aim of extending the portfolio of value-added services for Italian customers of a prominent European travel services organisation. This includes unified messaging, post paid and prepaid calling card services along with related validation, billing and payment systems.

1

Introduction

Datv traffic has traditionally been forced to fit onto the voice network (using modems, for example). The Internet has created an opportunity to reverse this integration strategy — voice and facsimile can now be carried over IP networks, with the integration of video and other multimedia applications close behind. VoIP’s appeal is based on its capability to facilitate voice and data convergence at an application layer. Increasingly, VoIP is being seen as the ideal last-mile solution for cable, DSL, and wireless networks because it allows service providers to bundle their offerings [1]. VoIP also offers service providers the ability to provision standalone local loop bypass and long distance arbitrage services. Additional bandwidth will be needed to support distributed, multimedia voice over IP applications building to multigigabit network backbones based on Gigabit Ethernet or Asynchronous Transfer Mode [2]. Customer demand is driving service providers to round out their service portfolios with a mix of voice, data, fax, and video services, and this trend is fuelling the convergence of voice and data network architectures. Merging voice traffic onto an existing data network represents significant cost savings and revenue opportunity for service providers. The popularity of the Internet is also driving the emergence of multimedia applications, many of which are ripe for the integration of voice and data traffic over a single network. These applications include Web-enabled call centres, unified messaging, real-time multimedia video/audio conferencing, distance learning, and the embedding of voice links into electronic documents. In fact, the full business potential of such applications is only beginning to be discovered [3]. But one thing is clear: these integrated voice-and-data applications will require a converged IP network. Managing company's communications media requires speedy, reliable, and cost-effective messaging solutions. With the emergence of Internet-based applications, enhanced messaging systems are fast becoming tools that can dramatically increase employee productivity, simplify an IT management and reduce P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 717–725, 2001 © Springer-Verlag Berlin Heidelberg 2001

718

S. Milanovic and Z. Petrovic

operating costs enterprise-wide. A unified messaging solution provides a single location for voice, fax, and email messages; users can have access to all of their messages from their desktop, cellular or wireless phone, or over the Internet and respond, forward, save, or delete messages. Messaging systems with conference calling capabilities let us automatically call the message sender, or click on a screen icon from a desktop and link several parties to the same discussion. With unified messaging a single application can be used to store and retrieve an entire suite of message types. Voice-mail messages stored as WAV files can be downloaded as e-mail attachments while travelling, a response recorded and returned to the sender, all recipients, or an expanded list. e-mail can be retrieved via a telephony user interface, converted from text to speech, and reviewed from an airport lobby phone or cell phone. Infrastructure is decreased as now a single application can provide voice, e-mail, and fax. Productivity is increased because what were once disparate message types can be retrieved via the most convenient, or the user's preferred, interface. The Internet and the corporate Intranet must soon be voice-enabled if they are to make the vision of “one-stop networking” a reality.

2

VoIP Overview

VoIP is an emerging technology that allows the systems and wires that connect computer networks to act as an alternative to phone lines — delivering real-time voice to both standard telephones and PCs. VoIP converts standard telephone voice signals into compressed data packets that can be sent locally over Ethernet or globally via an ISP's data networks rather than traditional phone lines [4]. Most serious voice traffic will not use the public Internet but will run on private IP-based global networks that can deliver voice data with minimal congestion. VoIP is vital, according to some analysts, to the continued existence and profitability of Internet Service Providers (ISPs), Application Service Providers ASPs), Local Exchange Carriers (LECs) and Inter Exchange Carriers (IXC). Enhanced services such as unified messaging, “follow-me”, Web-based services, calling cards, and billing are revenue-generating services carriers can offer with very low overhead and a high payback [5]. Figure 1 illustrates the IP network protocols that are currently being used to implement VoIP.

Fig. 1. VoIP protocol structure

A Practical Solution for Delivering Voice over IP

719

H.323 is an ITU (International Telecommunication Union) standard that enables audio, video, and data communications across IP-based networks. H.323 standard has been defined to describe terminals (i.e. client end points), equipment and services for multimedia communication over networks (such as LANs or the Internet) that do not provide a guaranteed QoS [6]. H.323 is a family of software-based standards that define various options for compression and call control. RTP (Real-time Transport Protocol) is an IETF real-time end-to-end protocol utilising existing transport layers for data that has real-time properties. RTCP (RTP Control Protocol) is an IETF protocol to monitor the QoS and to convey information about the participants in an ongoing session; provides feedback on total performance and quality so that modifications can be made. RSVP (Resource Reservation Protocol) is an IETF general purpose signalling protocol allowing network resources to be reserved for a connectionless data stream, based on receiver-controlled requests. The most important consideration at the network level is to minimise unnecessary data transfer delays. Providing sufficient node and link capacity and using congestion avoidance mechanisms (such as prioritisation, congestion control, and access controls) can help to reduce overall delay.

3

Objective

An acknowledged travel services organization planned to deliver telephone portal services with phone and Web access to customer’s e-mail, fax, address book, calendar, file storage service and Web News — anywhere, anytime, from any phone. To this extent, an IP based network was envisaged to transform "best-effort" communications into functionality that can support both continuous, streaming voice conversations as well as bursty data transmissions. A converged network infrastructure should be deployed at Italian corporate headquarter and integrated with London based network of a global enabler of enhanced Internet services. A leading supplier of global enhanced telecommunications and information services would provide travel services organization’s subscribers with telephone portal services (VOGO) [7], including telephone access to e-mail, unified messaging and other personal communications services. In addition to this general capability, specific features supporting voice transmission must also be implemented in the aimed network platform. These features include [8]: • Compression — Low bit-rate voice compression significantly reduces the amount of bandwidth used by a voice conversation while maintaining its high quality. • Silence suppression — The ability to recover bandwidth during periods of silence in a conversation makes that bandwidth available for data transmission and other network activities. • Quality of Service (QoS) functionality — Assuring priority for voice transmission is essential. On the Internet and other IP networks, QoS functionality is provided by the Resource Reservation Protocol (RSVP), which reserves resources across the network for a voice call. • Signalling for voice traffic — Data network equipment can provide more sophisticated services (such as least-cost routing and virtual private networks)

720

S. Milanovic and Z. Petrovic

than simple voice transmission, by recognising and responding to voice signalling. • Voice switching — Data network equipment can not only perform sophisticated voice transmission between company locations, but can provide private branch exchange (PBX) functionality by performing call processing and voice switching capabilities either within a campus or over the WAN. The challenge is to design such an information network that could be quickly and easily extended according to the projected business growth. This means that no large, up front investments for the future years should be required. The whole information system has to be manageable via user friendly and easy-to-use graphical user interface, which would reduce training and hand-over period at minimum. It is important to deploy management software that would include all standard options relating to control, configuration and voice over IP traffic analysis possibilities. This management software has to be modular and easy to upgrade in case of future increasing of the value-added services.

4

Requirements

Deployment of VoIP application for public use involves much more than simply adding compression functions to an IP network. Anyone must be able to call anyone else, regardless of location and form of network attachment (telephone, wireless phone or PC). Everyone must believe the service is as good as the traditional telephone network. Long-term costs (as opposed to simply avoiding regulatory costs) must make the investments in the infrastructure worthwhile. Any new approach to telephony will naturally be compared to the incumbent and must be seen as being no worse (i.e. the telephone still has to work if the power goes off), implying that all necessary management, security, and reliability functions are included. Some of the functions that are required for practical VoIP solution include: • Fault Management: One of the most critical tasks of any telecommunications management system is to assist with the identification and resolution of problems and failures. Full SNMP management capabilities using MIBs should be provided for enterprise-level equipment. • Accounting/Billing: VoIP gateway must keep track of successful and unsuccessful calls. Call detail records that include such information as call start/stop times, dialled number, source/destination IP address, packets sent and received, etc. should be produced. This information would preferably be processed by the external accounting packages that are also used for the PSTN calls. The end user should not need to receive multiple bills. • Configuration: An easy-to-use management interface is needed to configure the equipment (even while the service is running). A variety of parameters and options are involved. Examples include: telephony protocols, compression algorithm selection, dialling plans, access controls, PSTN fallback features, port arrangements and Internet timers. • Authentication/Encryption: VoIP offers the potential for secure telephony by making use of the security services available in TCP/IP environments. Access

A Practical Solution for Delivering Voice over IP

721

controls can be implemented using authentication and calls can be made private using encryption of the links.

5

The VoIP Solution

With reference to Figure 2, the following networking hardware had been deployed to deliver Voice over IP to subscribers of a rapidly evolving travel services organisation: • Nokia’s DX 220 IP Access integrates the PSTN and IP worlds to offer a high capacity solution for dial-up traffic, enabling a PSTN subscriber to access IP networks: company Intranets or ISP networks [9]. It offers telecom reliability and security for IP traffic, all in a compact package. DX 220 IP Access also provides the Always on Net service, which gives customers a constant connection to the Internet, and opens the window to next generation web-based businesses and services. • Nuera’s Open Reliable Communications Architecture (ORCA) GX-21 trunk gateway is the cost-effective solution for Digital Circuit Multiplication Equipment (DCME) applications. ORCA uses digital compression techniques to increase the capacity of cable links carrying voice, fax and voice-frequency modem traffic [10]. The ORCA GX-21 provides excellent line capacity gain and high quality transmission at all times, even under heavy traffic conditions in the facsimile demodulation mode. DCME applications transport many more voice channels over a transmission circuit than can normally be accommodated. ORCA-based DCME applications provide user-configured compression ratios from 4:1 to 20:1 with up to 17 compressed T1/E1 DCME trunks per chassis. Therefore, an E1 circuit that accommodates 32 voice channels can provide 640 voice channels when a DCME is deployed at each end. As a result, utilisation of the long-distance transmission circuits is dramatically increased. This large difference can turn a financially-threatened business case into a profitable venture. DCMEs provide more than just voice service. They also provide fax and modem services. The method used to multiply the throughput of the transmission circuit varies depending on what type of service is being provided. The multiplication ratio varies depending on the type of traffic: - Voice traffic multiplication is achieved by using voice compression technology to lower the bit rate. Over the years, lower and lower bit-rate vocoders have been developed. Traditional vocoder rates are 64Kb/s while currently 8Kb/s vocoders, with nearly the same voice quality, are common. Nuera offers the highest performance low-bit-rate vocoders in the industry, as proven in numerous independent lab tests. Generally, two people don’t speak at the same time while having a conversation. In addition, there are intervals of time when neither party is speaking. Therefore, when using newer generation packet technology, these silence intervals (which add up to more than 50% of the two-way session) can be used to carry more voice traffic from other conversations.

722

S. Milanovic and Z. Petrovic

ITALY (Rome)

UK (London)

PSTN 10 Euro-ISDN

}

2E1 trunks with S S 7 channel

Mobile Operator PSTN Toll Free & Local Access Numbers

LAN

PBX

20 E1's

Microsoft SQL Data Server ISDN Internet

20 E1's

IP Network

NT 4.0 Digitalk Server

VOGO

Nokia DX 220 IP Access

E1

H.323

Internet

Leased E1 Circuit 2.048 Mb/s FLAG Digitalk Service Node

Nuera ORCA GX-21 Compression IP/DCME

Nuera ORCA GX-21 Compression IP/DCME

Fig. 2. Deployed solution for delivering VoIP

- Fax traffic multiplication is achieved by demodulating the fax modem (being

carried in the 64Kb/s duplex PCM channel) at the near-end DCME to recover the data being transmitted. The base band data (which is typically 9.6Kb/s) is then transmitted to the destination where it is remodulated and delivered on a PCM (Pulse Code Modulation) channel. In the reverse direction, little information is transmitted. Therefore, the 64Kb/s of bandwidth in the reverse direction is available for carrying traffic from other channels. - Modem traffic multiplication is achieved by transporting the modem waveforms in a lower-bit-rate vocoder when compared to 64Kb/s PCM. Typically, the DCME network bandwidth used in each direction is three times the modem rate and supports modems up to 19.2Kb/s. Therefore, a 9.6Kb/s modem uses approximately 30Kb/s in each direction as compared to 64Kb/s in each direction on a traditional circuit switched network. • The Digitalk service node is an open standards-based switch, utilising industrystandard computer telephony hardware with support for tandem switching and prepaid interactive voice response [11]. Employed Digitalk service node includes

A Practical Solution for Delivering Voice over IP

723

a signalling Gateway Server (consisting of two Compaq ProLiant 1600R machines), an SQL Data Server (Compaq Proliant 3000R) dedicated as a Data Warehouse, the DataKinetics Septel ISA E1/T1 PC Line Card for SS7 (providing 2E1 trunks with SS7 channel) [12] and an Internal ISDN modem for Remote Access Service (RAS). Each Compaq Proliant 1600R handles 16 E1's (4 quadspan E1 boards/4slots). The system features of deployed Digitalk service node include: - Full Windows NT hosted administration and system configuration tools; - SS7-based Call Control providing a seamless interoperability to the PSTN and 99.999% reliability; - Fully featured least-cost routing based upon dialled digits or time of day/day of week; - Alternate routing on primary route congestion or port failure, automatic re-routing programmable on call failure codes; - Dynamic call editing allowing number modification for routing via alternate carriers; - Sophisticated SQL based call record logging and system load profiling tools; - Built-in protocol analyser tools and diagnostic test utilities; - Fully integrated remote management tools. Digitalk platform can be easily extended to a Tandem (redundant) switching architecture (see Figure 3) cost effectively by saving the original information platform. In this scenario, new technologies such as ATM and SQL server are integrated to allow massively scaleable solutions to be deployed.

Fig. 3. Tandem switching architecture

Digitalk service node can be linked to other nodes via 155Mb/s ATM fibre links connected into a 4.2Gb/s backbone (up to 24 switch nodes). Incoming calls on any node in the system can be routed transparently to any other node via the ATM switching backbone. It is possible to host a combination of applications on the same

724

S. Milanovic and Z. Petrovic

switch that would allow new trial services to be launched on existing hardware without the need for a fixed allocation of hardware and software resources.

6

Conclusion

Rather than building separate networks to offer multiple services, an international travel services organisation integrated various traffic flows onto efficient, packet switching infrastructures based on statistical multiplexing, which maximises the use of network capacity. Using the same infrastructure for all traffic also holds the promise of significant savings because the equipment handles multiple functions and the operational costs are reduced. Deployed solution for delivering Voice over IP provides the following features: • Mediation or gateway services between the PSTN and the IP network for transparent internetworking. • A high degree of scalability — the ability to affordably add processing and switching power as network expands. • The deployment of new and enhanced services. • Multiple services over a common infrastructure. • Automated and integrated management functions. • The ability to mix and match best-of-breed equipment and software from different vendors. While enabling new value-added services for Italian customers, it was in foresight for the near future to deploy similar information systems in other countries, providing a global delivery of Voice over IP to the international subscribers of a well known travel services organization. Convergence is on its way. Companies that delay for too long the adoption of first-wave convergence technologies, most notably VoIP, will suffer a substantial competitive disadvantage as these technologies enter the mainstream. There are, however, clear risks that need to be avoided at this early stage of converging technologies. To avoid these risks while still practising due diligence in advancing the corporate technology portfolio, decision-makers should carefully consider the use of intelligent multi-path gateway switching.

References 1. Stanislav Milanovic, Alessandro Maglianella, “ATM over ADSL Probe in Telecom Italia Environment”, Computer Networks, the International Journal of Computer and Telecommunications Networking, Vol. 34, No. 6, pp. 965-980, November 2000, http://www.elsevier.com/inca/publications/store/5/0/5/6/0/6/index.htt. Proceedings of TERENA Networking Conference 2000, the Trans-European Research and Education Networking Association Conference: “Pioneering Tomorrow’s Internet”, May 2000, Lisbon, Portugal, http://www.terena.nl/tnc2000/proceedings/10A/10a3.pdf 2. Stanislav Milanovic, “At the Front End in Migrating to Gigabit Ethernet”, Proceedings of SoftCOM 2000, the IEEE Conference on Software,

A Practical Solution for Delivering Voice over IP

725

Telecommunications and Computer Networks, pp.369-378, October 2000, http://www.fesb.hr/SoftCOM/2000/IE/Network_Architectures.htm 3. “Migrating Corporate Voice Traffic to the Data Network - Strategies, Risks and Rewards“, The Technology Guide Series, The Applied Technologies Group Inc., 2000. 4. “Migrating to Multiservice Networks — A Planning Guide”, White Paper, Cisco Systems Inc., 1999. 5. “nuVOICE –Next Generation VoIP Solutions”, White Paper, Nuera Communications Inc., 2000. 6. “Voice over IP (VoIP)”, The Technology Guide Series, The Applied Technologies Group Inc., 1998. 7. http://www.vogo.net/ 8. “Calling on the Network for Voice Communications”, Packet Magazine Archives, Cisco Systems Inc., 1998. 9. “Nokia DX 220 IP Access Solution”, White Paper, Nokia Networks, 2000. 10. “ORCA Brochure”, White Paper, Nuera Communications Inc., 2000. 11. “Digitalk Gateway”, White Paper, Digitalk Ltd, 2000. 12. “Septel ISA E1/T1 PC Line Card for SS7”, White Paper, DataKinetics Ltd, 2000.

QoS Guaranteed Voice Traffic Multiplexing Scheme over VoIP Network Using DiffServ Eun-Ju Ha, Joon-Heup Kwon, and Jong-Tae Park Department of Electronic Engineering, Kyungpook National University, 1370 KanKyug-Dong, Buk-Gu, Taegu, Korea [email protected], [email protected], [email protected]

Abstract. The current VoIP transfer methods using low bit rate codes such as G.723.1 and G.729 are still very inefficient due to its small payload size in comparison with its large overhead size. Besides, the traffic load on the access routers tends to geometrically increase when the incoming traffic flows of short packets increase. These factors cause problems such as delay, jitter, and packet loss, which seriously deteriorate the voice quality. We propose a new efficient voice traffic multiplexing scheme with guaranteed end-to-end QoS between VoIP access routers using differentiated services (DiffServ). The newly defined RTP/UDP/IP packets, namely, L_packet (long packet) using DiffServ are multiplexed at ingress routers for offering real-time communication services in very high-speed backbone network. We analyze the performance of proposed scheme for various bit rate type traffics and simulate the call blocking probability. It shows that the proposed scheme quite satisfactorily guarantees the end-to-end QoS requirements.

1

Introduction

The VoIP systems are expected to be very extensively used throughout the world because of their low price, better user interfaces, and potentiality for providing integrated multimedia applications over IP networks. Internet can’t satisfy various quality of service (QoS) requirements mainly due to its transport mechanism based on best effort services. In order to transmit the voice over packet network, VoIP access routers are required. VoIP access router provides an interface between the existing circuit switched telephony system such as PSTN/PLMN and the packet switched IP networks. To guarantee a quality of service for real-time audio and video applications, the IP based protocol stack of the real-time transport protocol (RTP) over user datagram protocol (UDP) is required. RTP is used as means of achieving interoperability among different implementations of network audio and video applications, and integrated into the H.323 protocol stack, which was standardized by the ITU-T. RTP is often used to unicast and multicast real-time traffic transmission of audio, video, and P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 726–734, 2001 © Springer-Verlag Berlin Heidelberg 2001

QoS Guaranteed Voice Traffic Multiplexing Scheme over VoIP Network

727

interactive simulation over Internet, but it can’t support end-to-end QoS. So, we need an appropriate RTP/UDP/IP packet encapsulation procedure for the incoming voice traffic over access networks to guarantee QoS. In a traditional VoIP application, telephone calls between PSTN/PLMN users interconnected by a pair of IP-ARs are carried by separate IP/UDP/RTP connections. At present, the low bit rate codes such as G.723.1 [1] and G.729 [2] are used to the baseline codec of VoIP. They compress incoming speech samples, and generate packets with sizes ranging from 5 to 20 bytes per speech sample. For example, G.723.1 compresses voice traffic to 5.3 kbps/6.3 kbps and the payload size is defined to be 20 bytes. That is, only one-third of all the traffic is payload and other two-thirds (i. e., RTP (12 bytes) + UDP (8 bytes) + IP (20 bytes)) is overhead. If voice traffic is sent in a RTP packet, this means that only 33 % of the total size of the packet is used to the payload. In addition, the traffic load on the routers would increase geometrically due to the traffic flows of many short packets. This causes the delay, jitter and packet loss problems. Thus, in order to guarantee end-to-end QoS requirements for real time voice service over IP network, we must take proper actions of decreasing this large overhead of the increased IP/UDP/RTP packet headers between VoIP access routers in the first place. It is expected that the future backbone network will be constructed by using very high-speed WDM network with more than 10Giga bps. In this kind of very highspeed backbone network, the main cause of QoS deterioration is due to poor bandwidth control. To guarantee end-to-end QoS in high-speed backbone network, integrated services (IntServ) and resource reservation protocol (RSVP) has been proposed. However, these approaches are based on the per-flow management, which may cause a scalability problem. It is also known that these approaches cost very high for the construction. As another solution, the IETF has proposed a new architecture, called differentiated services (DiffServ). This architecture allows flow aggregation, that is, a number of traffic flows being handled as one unit. Except for fixed bandwidth allocation, it is shown that the flow aggregation based on DiffServ is efficient to guarantee end-to-end QoS in a high-speed backbone network [3]. Secondly, in order to guarantee QoS in very high-speed backbone network, the bandwidth control mechanism is required to incoming RTP/UDP/IP packets of ingress routers. There are some related works dealing with these voice streams multiplexing issues [1-3] and DiffServ [4-5]. But, previous related researches have usually focused on access network, or backbone network, not both in an integrated way. Their solutions can’t be applied for the satisfaction of the true end-to-end QoS requirements. In this paper, we propose a new end-to-end QoS guaranteeing mechanism by combining RTP/UDP/IP packet multiplexing scheme with DiffServ QoS architecture. We adapt RTP/UDP/IP packet multiplexing scheme in Ref [6] to our scheme with some modification. At ingress router, the appropriate control mechanism is required to support end-to-end QoS for input traffic. We solve this problem by using DSCP (DiffServe Code Point) of DiffServ. We analyze the performance of proposed scheme using M/G/1 with HOL-NPR (head-of-line non-preemptive) queueing model. This scheme not only significantly reduces the short traffic flow management cost, but also

728

E.-J. Ha, J.-H. Kwon, and J.-T. Park

guarantees the end-to-end QoS requirements. The remainder of this paper is organized as follows: Section 2, we present the overall architecture and multiplexing packet formats of voice traffic using DiffServ. In Section 3, we present the analysis results and Section 4 shows the numerical results. Our conclusion follows in Section 5.

2

VoIP System Architecture Using DiffServ

In this section, we present overall VoIP architecture and its multiplexing packet format using DiffServ. Figure 1 shows the overall architecture. The number of access networks, which are connected to one ingress router depends on the real capacity of ingress router. We use the RTP/UDP/IP packet multiplexing concept based on Ref[5] to reduce the packet overhead to 67%. However, the major problem of Ref[5] is that it does not take into account any QoS requirements. Thus, we modify voice traffic multiplexing scheme in Ref[5] in order to support QoS requirements. We propose the new multiplexing scheme using DSCP of DiffServ [6]. The key idea is as follows; Add voice stream multiplexing scheme with identical destination IP address and DSCP (DiffServ Code Point)

IP Network PSTN 1 PSTN 1

1 ml

Egress Router a

ml 2

PSTN 2

Ingress Router

PSTN 2

Egress Router b

ml n PSTN n

Egress Router n

PSTN n

Fig. 1. Overall Architecture

Figure 2 presents the transmission link between ingress router and egress router in more detail. The same model can be applied to the other links. We define the several parameters shown in Figure 2. ml is defined as the multiplexing link. We assume that the capacity of link is infinite. t is defined as a trunk. In our model, trunk is defined to be a group of voice traffic, which has identical destination and DSCP. vt is defined as voice traffic. We assume that the capacity of vt is all the same.

QoS Guaranteed Voice Traffic Multiplexing Scheme over VoIP Network

729

vt 1

Destination IP = Router a

DSCP_EFi

Destination IP = Router a

DSCP_AFj

t1

vt n vt 1

t2

vt n

ml vt 1

Destination IP = Router a

DSCP_BEk

tn

vt n

Fig. 2. Multiplexing link between Ingress router and Egress router

In order to guarantee the end-to-end QoS, we propose new RTP/UDP/IP packet format at ingress router. We define L_packet (Long Packet), which adapt DiffServ DSCP to RTP/UDP/IP packet format. Figure 3 shows the L_packet format, which uses the ingress, intermediate, and egress router. At ingress router, the L_packet, which has the same destination and DSCP, is classified and destined to egress router through several intermediate routers. At intermediate router, it only transits the L_packet without any modification based on DSCP value. At egress router, the arrived L_packets are separated and processed according to the priority of DSCP value.

IP

UDP RTP1 Payload 1 RTP2 Payload 2 RTP3 Payload3

RTPn Payloadn

(a) Previous RTP/UDP/IP Packet Format in Ref [6] IP

UDP

L_Packet

EF_L_Packet 1

IP

UDP

L_Packet

EF_L_Packet N

IP

UDP

L_Packet

AF_L_Packet 1

IP

UDP

L_Packet

AF_L_Packet N

IP

UDP

L_Packet

BE_L_Packet 1

IP

UDP

L_Packet

BE_L_Packet N

(b) Proposed RTP/UDP/IP Packet Format using DiffServ Fig. 3. Multiplexing RTP/UDP/IP Packet Format

730

3

E.-J. Ha, J.-H. Kwon, and J.-T. Park

Performance Evaluation

3.1 Mathematical Model In this section, we first describe the mathematical model. In the near future, it is expected that the backbone network is to be installed with very high-speed WDM network with more than 10Giga bps. In this very high-speed backbone network, the main problem for the QoS deterioration is caused by poor bandwidth control. Thus, we describe the end-to-end voice traffic blocking probability based on M/G/1 with HOL-NPR (head-of-line non-preemptive) queueing model in Figure 2. We assume that at least one trunk can be established between ingress router and corresponding egress router. The voice traffic blocking occurs by two things. One is due to the contention among voice traffics sharing the same trunk, with the same destination of egress router. The other is caused by contention among trunks sharing the link. We first derive the mathematical model of the first part. In this case, we assume that the incoming voice traffics are classified into their priorities and complete the multiplexing procedures at ingress router.. Link capacity of an ingress router is denoted by C(ml). The number of voice traffics accommodated at each trunk depends upon their traffic characteristics. Each trunk has different voice traffic arriving rate and mean service time. We assume that there are P types of queues. In a queue of type k (k = 1, 2, …, P), there are mk servers and no waiting room. When there is no trunk established between ingress router and corresponding egress router and a setup requirement of voice traffic between them newly arrives, ingress router checks whether there is still bandwidth available for a new trunk establishment on the link. The ingress router will reserve some amount of the bandwidth required by mk voice traffic for a trunk of type k on the link if possible. Furthermore, if the corresponding trunk is already established and it can further accommodate more flow, the flow will be accepted. Otherwise, the flow will be blocked. The trunk will be released when it has no voice traffic. Arrivals of customers at a queue of type k are characterized by an independent Poisson process with an arrival rate , and with an arbitrary or general service time distribution of form k B(x) with a finite mean k .

λ

h

3.2 Performance Analysis In this section, we analyze the mathematical model described in the previous section. It follows the Ref [2,3]. Let

ρ =λ h k

We denote by

P

k

k

k

denote the traffic intensity in a trunk of type k.

(i ) the steady state probability of i (i = 1,2, …, mk) customers at a

trunk of type k using the Ref [7].

QoS Guaranteed Voice Traffic Multiplexing Scheme over VoIP Network

−1

ρ Where, (0) i

P (i) = P k

mk Pk (0) = [ ∑ i =0

k

k

i!

ρ ik ] i!

(1)

Let B ( m, ρ ) denotes the blocking probability with traffic intensity known that B ( m, ρ ) can be computed by the recursion [8];

B (m, ρ ) =

731

ρB(m − 1, ρ ) , m = 1,2, … m + ρB (m − 1, ρ )

ρ . It is well

(2)

with B (0, ρ ) = 1 . Thus, the conditional mean number M k is given by mk

∑ i P (i ) ρ = M 1 − (0) = P k

i =1

k

(1 − B (mk , ρ )) k

(3)

1 − P k (0)

k

k

Next, we describe the mean busy period

H of a trunk of type k. Since the k

sequence of idle and busy period is regarded as an alternating renewal process, we have

H

k

=

1 − Pk (0)

λ P (0) k

(4)

k

Customer loss occurs in two ways. One is that a customer arrives when his trunk is full, and the other is that the trunk is empty but the reservation at the second step is failed on arrival. We denote the blocking probability of customers arriving in trunks of type k in the former and the latter cases by P (1) (k ) and ( 2 ) , respectively. P loss loss Apparently, the overall blocking probability Ploss(k) of customers arriving in a trunk of type k is given by

P

loss

(k ) =

P

(1) loss

( 2) ( k ) + Ploss ( k ) . We first consider

P

(1) loss

(k ) .

We define

that the probability r(k) that a trunk of type k is reserving mk servers using the Ref [7]. r (k ) = U k

( N , C (ml ))

N

(6)

k

Therefore, we have

P

(1) loss

(k ) = r (k )

B ( mk , ρ ) k

1 − P k ( 0)

(7)

Next we consider the overall blocking probability Ploss(k). Since the blocking probabiity is a fraction of lost customers to customers arriving in a unit time, we have

732

E.-J. Ha, J.-H. Kwon, and J.-T. Park

P

loss

(k ) = 1 − M k U k

(8)

( N , C (ml ))

N ρ k

k

However, the above call blocking probility are effective in the case of the total waiting time for customers from type k in class N can’t exceed the end-to-end delay bounds. The total waiting time (Tp) in our queueing model is defined as follows. mk

T

p

=

h (1 − σ ) + ∑ λ h (1 − σ )(1 − σ ) k

k

i =1

2

k

/2

Where,

k +1

k

4

k

σ

k

mk =∑ρ i =1

(9) k

Numerical Results

In this section, we evaluate the blocking probability using our proposed scheme. We treat the heterogeneous trunk case. We defined related parameters as follows; Defined Parameters - Link capacity: C(ml) = 150 Mbps - Allocated bandwidth for each voice traffic: N(vt) = 10 kbps - Number of traffic types: P = 2 (high and low) - Number of low trunks (i. e. DSCP_AF and DSCP_BE): N(L) = 100 - Number of high trunks (i. e. DSCP_EF): N(H) = 10 - Mean traffic intensity for each low trunk: ρ = 2 voice traffic L

- Mean holding time: hL = 1 [min] = 30 [sec] - Mean interarrival time: 1

λ

L

λ

H

- Mean traffic intensity for each high trunk: ρ = 1250 voice traffic H - Mean holding time: hH = 1 [min] - Mean interarrival time : 1 = 48 [msec] - Capacity of each of DSCP_AF and DSCP_BE trunks : mL flows - Capacity of each of DSCP_EF trunks : mH flows We assume two types of traffic such as high and low. The high traffic flows are preferentially assigned to the DSCP_EF trunks. The high trunks have larger capacity to meet their higher demand than the low trunks. The low traffic flows are assigned to the DSCP_AF and DSCP_BE trunks according to the trunk conditions. In our evaluation, the total amount of traffic is fixed to 12700 flows. So, the mean utilization becomes 84.7% if there is no blocking. Table 1 shows the voice traffic blocking probability according to the varying capacity of each of low class trunks. In this case, the amount of DSCP_EF is fixed to 1400 flows. From Table 1, the optimal value to minimize the voice traffic blocking probability for DSCP_AF and DSCP_BE trunks

QoS Guaranteed Voice Traffic Multiplexing Scheme over VoIP Network

733

exists in which both DSCP_EF, DSCP_AF, and DSCP_BE trunk blocking probability becomes less then 10-4. It demonstrates that the QoS requirements are well satisfied by using our proposed scheme. Also, the same results are obtained in case where the capacity of each of high-class trunks is varied as time goes by. Table 1. Voice Traffic Blocking Probability

ML 2 4 6 8 10 12 14 16

5

Ploss(H) 1e-06 1e-06 1e-06 1e-06 1e-06 1e-06 1e-06 1e-06

Ploss(L) 0.798 0.1 0.098 0.001 0.0000429 0.096 0.1098 0.689

Conclusion

We present the end-to-end QoS guaranteed voice traffic multiplexing scheme between VoIP access routers using differentiated services (DiffServ). At ingress router, the newly defined RTP/UDP/IP packets, namely, L_packet (long packet) are multiplexed according to same destination egress router and same DSCP. To prove the validity of our scheme, we have described the network model developed here to analyze the blocking performance. Also, we analyzed the model using M/G/1 with HOL-NPR queueing system. Finally, we have presented numerical results using the analysis. Through the results, the proposed scheme is shown to be very efficient to guarantee the QoS requirements over VoIP.

References 1. Floyd S, “Notes on CBQ and Guaranteed Service”, ftp://ftp.ee.lbl.gov/papers/guarantedd.ps, July 1995. 2. Katsuyoshi IIDA, Tetsuya TAKINE, Hideki SUNAHARA, and Yuji OIE, “Delay Analysis for CBR traffic in static-priority scheduling: single-node and homogeneous CBR traffic case”, IEEE SPIE’97. 3. Katsuyoshi IIDA, Kenji KAWAHARA, Tetsuya TAKINE, and Yuji OIE, “Performance Evaluation of the Architecture for End-to-End Quality-of-Service Provisioning”, IEEE Communication Magazine, April 2000.

734

E.-J. Ha, J.-H. Kwon, and J.-T. Park

4. Giuseppe Biawnchi, Antonio Capone, and Chiara Petrioli, “Throughput Analysis of End-to-End Measurement-Based Admission Control in IP”, IEEE INFOCOM’2000. 5. Tohru HOSHI, Keiko TANIWAQA, ad Koji TSUKADA, “Voice Stream Multiplexing between IP Telephony Gateways”, IEICE Trans. INF. & SYST., Vol, E82-D, No. 4, April 1999. 6. Hassan Naser, and Alberto Leon-Garcia, “Voice over Differentiated Services”, IEEE draft, draft-naser-voice-diffserv-eval-00.txt, December 1998. 7. Ross, K.W., “Multiservice Loss Models for Broadband Telecommunication Networks”, Sprnger, Berlin, 1995. 8. Cooper, Introduction to Queueing Theory, CEEPress, Washington, D.C., 3rd edition, 1990.

VoIP over MPLS Networking Requirements Jong-Moon Chung1,*, Elie Marroun2, Harman Sandhu3, and Sang-Chul Kim1 1

School of Electrical and Computer Engineering, Oklahoma State University, Stillwater, OK 74078, U.S.A {jchung, sangchu}@okstate.edu 2 Cisco Systems, 1450 N. McDowell Blvd., Petaluma, California, 94954, U.S.A. 3 Cisco Systems, 2200 E. Pres. George Bush Trnpk., Richardson, Texas 75082, U.S.A.

Abstract. Multiprotocol label switching (MPLS) is currently emerging as the protocol of the future due to several key features that MPLS networking provides through traffic engineering. Some of these features are possible due to its multiprotocol architecture where it utilizes a simple label switching procedure to provide various quality of service (QoS) features, explicit source routing, differentiated services, architectural scalability, integrated service features, and high quality end-to-end service features that are necessary for virtual private networks (VPNs). Currently, the constraint-based routing label distribution protocol (CR-LDP) and the extensions to the resource reservation protocol (ERSVP) are the signaling algorithms under development that will be used for MPLS traffic engineering. In this paper, we investigate the requirements of MPLS networking for voice over IP (VoIP) applications, and propose extensions to the MPLS protocol, MPLS routers, CR-LDP, and E-RSVP for improved compatibility and system performance of VoIP over MPLS (VoMPLS) network services.

1 Introduction Voice applications over IP routing utilizing MPLS networks require several changes in the signaling algorithm and voice data transfer mechanism in order to provide the enhanced QoS features that voice and real time data require. MPLS networking is under development to provide scalable integrated and differentiated service features that current IP networking cannot provide. The classification, queue, and scheduling (CQS) traffic engineering topologies of MPLS network routers enable the network to This research was funded by Williams Communications, Inc., One Williams Center, Tulsa, Oklahoma 74172, U.S.A.

*

J.-M. Chung is the Director of the Advanced Communication Systems Engineering Laboratory (ACSEL) and the Oklahoma Communication Laboratory for Networking and Bioengineering (OCLNB) at the Oklahoma State University.

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 735–744, 2001 © Springer-Verlag Berlin Heidelberg 2001

736

J.-M. Chung et al.

provide controllable quality of service (QoS) and grade of service (GoS) features. MPLS networking also provides a solution to scalability and enables significant flexibility in routing [6]. MPLS was intended to solve the differentiated service (DS) problems of IP connectionless datagram networking. Hence MPLS routers (i.e., label edge routers (LERs) and label switching routers (LSRs)) need to incorporate the CQS parameters required by the application (voice, video, data, control data, etc.). This will require the LSRs and LERs to support and interact with the transport-layer, network access layer, and the physical layer up to some degree to provide enhanced service features. The current MPLS networks are not fully equipped to support voice data applications properly. Some of these examples can be seen in the signaling protocol mechanisms. The label switching router (LSR) that conducts DS is required to conduct a three-step procedure to enable traffic engineering. These three basic steps are classification, queue, and scheduling (CQS). As label attached packets arrive at the input ports, the input label is used to identify the forwarding equivalent class (FEC) and the corresponding output label. The output label replaces the input label of the packet. Then, based on the output label and FEC, the packet is sent to the corresponding output queue where the scheduling multiplexer decides on the output order, timing, and the output port for the packet to be sent out. The setup of the LSR is done by the signaling protocols (LDP, CR-LDP, RSVP, E-RSVP). The Real Time Protocol (RTP) is the Internet-standard protocol for the transport of real-time data, including audio and video. It can be used for media-on-demand as well as interactive services such as Internet telephony. RTP consists of a data and a control part. The latter is called Real Time Control Protocol (RTCP). While UDP/IP is its initial target-networking environment, efforts have been made to make RTP transport-independent so that it could be used, say, over CLNP (Connection-Less Network Protocol), IPX (Internetwork Packet Exchange) or other protocols such as MPLS. RTP is currently also in experimental use directly over AAL5/ATM. RTP does not address the issue of resource reservation or quality of service control; instead, it relies on resource reservation protocols such as RSVP. No end-to-end protocol, including RTP, can ensure in-time delivery. This always requires the support of lower layers that actually have control over resources in switches and routers. Therefore, the idea of making RTP run over CR-LDP in an MPLS network will provide certain reliability as well as add some constraints and QoS features. The current RSVP and the E-RSVP are IP based soft-state protocols [3]. E-RSVP was developed to enable RSVP signaling for MPLS networks. RSVP and E-RSVP need to be able to signal RTP/UDP transport layer setup and prepare the MPLS network routers (i.e., LERs and LSRs) with the required service features to guarantee QoS and GoS for real-time constrained voice data packets. On the other hand, LDP and the proposed CR-LDP relies on the user datagram protocol (UDP) for peer-to-peer and TCP for end-to-end data transport-layer operation [1,2]. Although TCP is the most widely used transport layer protocol, there are several weaknesses that TCP has which makes TCP difficult to be used for voice applications. First TCP is a point-to-point connection oriented protocol that makes its

VoIP over MPLS Networking Requirements

737

application unsuitable for multicasting distribution. Second, TCP applies an algorithm for retransmission of lost segments, which is not suitable for most real time applications. Third, TCP contains no mechanism for associating timing information with segments, e.g., timestamp, fraction loss, packet loss, inter-arrival jitter, time delay, etc. In addition, UDP is not equipped to support general-purpose tools for real-time applications of voice [18]. Several of these requirements for QoS and GoS in VoIP over MPLS (VoMPLS) networks are well described in [12]. Although, [12] does not provide methodologies of how to extend these features to the MPLS architecture, LER and LSR functionalities, E-RSVP, and CR-LDP signaling protocols. This paper therefore proposes several extensions to E-RSVP and CR-LDP that must be made to enable RTP over UDP protocols to work with E-RSVP and CR-LDP. Additionally, the MPLS routers should be able to operate with the required RTP parameters that are requested in the LSP setup through E-RSVP or CR-LDP for guaranteed QoS and GoS for VoIP over MPLS networks. Based on the RTP standards [23] RFC 1890, 128 kinds of real-time payload types for standard audio and video encoding are each assigned a 7 bit code. This code can be embedded into the signaling protocol along with the indication of the RTP/UDP to the MPLS LSRs in the LSP setup mode. Currently, there are no Internet drafts or standards that specify the service level agreement (SLA) for the signaling protocols (E-RSVP or CR-LDP) at the edge routers [1]. Only the local behavior specifications of the LSRs are indicated. Therefore, the ingress LER which is operating the source explicit-routing procedures must be able to trigger the desired service requirement by indicating its type of connection requirements [1]. Current and past protocols were not able to provide guaranteed services. In order to enable MPLS to provide guaranteed services additional service payload recognition is required. In this paper, we propose novel methods to make this indication possible such that at the setup mode of the LSP, E-RSVP and CR-LDP can inform the LSRs more specifically about the traffic characteristics and correspondingly reserve the required resources for real-time high QoS or guaranteed services.

2 Extensions to E-RSVP for VoMPLS Extensions to RSVP (E-RSVP) have been made and proposed to support explicit route LSPs as well as provide additional features to RSVP. Since the RSVP protocol was proposed to support MPLS LSP setups, a considerable amount of modifications and extensions have been made to the original protocol to cope up with the traffic engineering requirements. In addition to the extensions already made, more extensions need to be added to the RSVP protocol in order to support voice traffic over the MPLS architecture.

738

J.-M. Chung et al.

Fig. 1. Format of the (a) PATH message, (b) Sender Descriptor, and (c) RESV message. Not drawn to scale. Each field may be variable length based on protocol subfields applied.

Voice traffic is best handled by RTP/UDP at the transport and higher application layers. Hence, whenever voice is sent, the protocol ID in the IP datagram would be set to UDP. Since, RSVP uses raw IP datagram forwarding, RSVP signaling should be able to give enough information to indicate the kind of traffic that would be sent over the established path. We propose modifications to the LABEL_REQUEST and SESSION objects. Additional traffic specs can be added by using the SENDER_TSPEC field of the Sender Descriptor field. The PATH message and the RESV message have the following format as shown in Fig. 1. The shadowed areas are the fields that will have the RTP/UDP protocol indication to trigger the desired operational features.

VoIP over MPLS Networking Requirements

739

Fig. 2. Label Request object without Label Range (Class = 19, C_Type = 1).

Fig. 3. Label Request object with ATM Label Range (Class = 19, C_Type = 2).

The Label Request object in the PATH message was modified to include an 8 bit protocol field to indicate the RTP/UDP transport layer operation as well as the realtime payload type operation and corresponding requirements. Fig. 2-4 show the fields where the Protocol field was assigned. Each of these fields was taken from the Reserved fields which were reserved for extensions to be made.

Fig. 4. Label Request object with Frame Relay Label Range (Class = 19, C_Type = 3).

Fig. 5. LSP_TUNNEL_IPv4 Session Object (Class = SESSION, LSP_TUNNEL_IPv4, C_Type = 7).

The Session object in the RESV message was modified the same way as the Label Request message to include an 8-bit protocol field to indicate the RTP/UDP transport layer operation as well as the real-time payload type operation and corresponding requirements. Fig. 5 and 6 show the fields where the Protocol field was assigned.

740

J.-M. Chung et al.

Fig. 6. LSP_TUNNEL_Ipv6 Session Object (Class = SESSION, LSP_TUNNEL_IPv6, C_Type = 8).

3 Extensions to CR-LDP for VoMPLS Extensions to CR-LDP are still under research. Many parameters are being included in the optional field of the CR-LDP Label Request Message and the CR-LDP Label Mapping Message to support certain services. RTP does not define any mechanisms for recovery of packet loss. Such mechanisms are likely to be highly dependent on the packet content or the underlying technology used. The idea of including RTP in the CR-LDP messages, as an optional field, will help having a reliable real time application like Voice over IP over MPLS (VoMPLS) since CR-LDP could be used as a bearer control for voice traffic. This application will have an end-to-end connection including all the MPLS features such as QoS, traffic engineering and protection. The CR-LDP messages will enable the MPLS LSRs to detect voice traffic traveling through the network and initialize an RTP/UDP/IP/MPLS encapsulation type. Since the optional parameters may appear in any order, RTP could be placed in different ways in the CR-LDP messages, for example in the traffic TLV parameters. However, the message could be composed of variable length, ranging from 0 to 31 bits. It should contain bits to initialize the RTP session over MPLS network. Besides, important voice issues must be included in the RTP parameter about Packetization/De-packetization, compression and multiplexing. Addressing these issues in the RTP message will help other applications like H.323 to work efficiently in the voice transport mechanism. Since RTP does not support any mechanisms for recovery of packet loss, future research could be done on addressing this problem. One solution for that is to include some features in the RTP parameter in the CR-LDP message notifying the sending user of the lost packets and about the status of the network, i.e., congestion and queuing. The encoding for the CR-LDP Label Mapping Message is extended with an Aux LSPID TLV, Route Record TLV, and Stacked Label TLV as shown in Fig. 8-9.

VoIP over MPLS Networking Requirements

Fig. 7. Extensions to CR-LDP Label Request Message.

Fig. 8. Extensions to CR-LDP Label Mapping Message.

Fig. 9. Traffic Parameters TLV protocol format.

741

742

J.-M. Chung et al.

4 RTP Relay Functions A RTP relay operating at a given protocol layer is an intermediate system that acts as both a destination and a source in a data transfer. RTP allows the use of two kinds of RTP relay systems, namely translators and mixers [18]. A mixer is a system that receives stream of RTP data packets from one or more sources, where the mixer may possibly change the data format and/or combine the data streams and then forward the combined stream. In general, the timing among multiple input sources will not be synchronized, therefore, the mixer will make timing adjustments among the streams and generate its own timing for the combined stream, thus being the synchronization source (SSRC) [22, 23]. On the other hand, a translator forwards RTP packets with their SSRC identifiers, which makes it possible for receivers to identify individual sources even though packets from all the sources pass through the same translator and carry the translator's network source address. Based on the service requirements, translators may change the encoding of the data and thus the RTP data payload type and timestamp. If multiple data packets are combined into one packet, or vice versa, a translator will assign new sequence numbers to the outgoing packets [22, 23]. The true multiprotocol architecture of the MPLS protocol becomes more appropriate for the relay operations. Unlike ATM cell types that depend on link connection type as well as the bit rate format (e.g., constant or variable bit rates), MPLS LSRs will operate on a more flexible traffic engineering concept through the FECs of selection through the consideration of the CoS and application requirements.

5 RTCP over MPLS Functions The real time control protocol (RTCP) provides network congestion control services for real-time data transportation. Some of the basic functions of RTCP include analyzing sender and receiver reports and maintaining the measurement and calculation of the packet loss and jitter. Packet loss is measured to provide persistent congestion control. Packet loss requires the cumulative number of packets lost and fractions lost to be measured. The cumulative number of packets lost is used in the calculation of network throughput. The fraction lost is used when shortage of reception station information and interval between reports becomes long [22, 23]. Interarrival jitter is used for transient congestion control. The interarrival jitter field provides a second short-term measure of the network congestion. Packet loss tracks persistent congestion while the jitter measures the transient congestion. The jitter measure may indicate congestion before it leads to packet loss [22, 23]. The CQS architecture of MPLS routers enables the network to provide adaptive traffic engineering QoS and GoS features. The MPLS network will need to incorporate the RTP and RTCP service fields and map them into MPLS CQS parameters corresponding to application (voice, video, data, control data, etc.). This will require the LSRs and LERs to support and interact with the RTP/RTCP transport-layer, network access layer, and the physical layer up to some degree to provide enhanced service features.

VoIP over MPLS Networking Requirements

6

743

Conclusion

Currently, based on the knowledge of the authors, there is little provision within IETF drafts or articles that connect the real-time QoS issues to the MPLS protocol and networking architecture. The real-time transport functions are well prepared in RTP and RTCP. Hence, this paper proposes methods of how to enable MPLS LSPs to acknowledge the RTP/RTCP information and correspondingly provide appropriate actions for real-time quality services in MPLS networks. Interfacing MPLS with RTP is necessary since RTP does not address the issue of resource reservation or QoS management; instead, it relies on resource reservation protocols such as RSVP, extensions to RSVP, or CR-LDP for this functionality. In addition, it is impossible for a transport layer end-to-end protocol alone to ensure in-time delivery. Real-time high quality transport services require the support of the lower layers, which are actually in control over the resources in the switches and routers. In order to accomplish guaranteed real-time data services, the lower layers need to interact with the RTP and RTCP fields and take certain information (e.g., payload type and/or interarrival jitter parameters) into account in the service delivery mechanism.

References [1] O. Aboul-Magd, L. Andersson, P. Ashwood-Smith, F. Hellstrand, K. Sundell, R. Callon, R. Dantu, P. Doolan, T. Worster, N. Feldman, A. Fredette, M. Girish, E. Gray, J. Halpern, J. Heinanen,T. Kilty, A. Malis, P. Vaananen, and L. Wu, “Constraint-Based LSP Setup using LDP,” IETF Draft, http://www.ietf.org/internet-drafts/draft-ietf-mpls-cr-ldp-04.txt, July 2000. [2] L. Andersson, P. Doolan, N. Feldman, A. Fredette, and B. Thomas, “LDP Specification,” IETF Draft, http://www.ietf.org/internet-drafts/draft-ietf-mpls-ldp11.txt, Aug. 2000. [3] D. O. Auduche, L. Berger, D. H. Gan, T. Li, V. Srinivasan, and G. Swallow, “RSVP-TE: Extensions to RSVP for LSP Tunnels,” IETF Drafts, http://www.ietf.org/internet-drafts/draft-ietf-mpls-rsvp-lsp-tunnel-06.txt, July 2000. [4] D. Awduche, A. Chiu, A. Elwalid, I. Widjaja and X. Xiao, “A Framework for Internet Traffic Engineering,” IETF Draft, http://www.ietf.org/internetdrafts/draft-ietf-tewg-framework-02.txt, July 2000. [5] C. Casetti, J. C. De Martin, and M. Meo, “A Framework for the Analysis of Adaptive Voice over IP,” former IETF Draft, (currently removed from IETF links.) [6] J.-M. Chung, (Invited Paper) “Analysis of MPLS Traffic Engineering,” Proceedings of the IEEE Midwest Symposium on Circuits and Systems 2000 Conference (IEEE MWSCAS’00), East Lansing, MI, USA, Aug. 8-11, 2000.

744

J.-M. Chung et al.

[7] N. Demizu, K. Nagami, H. Esaki, Y. Katsube, and P. Doolan, “VCID Notification over ATM link for LDP,” IETF Draft, http://www.ietf.org/internet-drafts/draftietf-mpls-vcid-atm-05.txt, Aug. 2000. [8] D. De Vleeschauwer, B. Steyaert, and G. H. Petit, “Performance analysis of voice over packet based networks.” submitted to ITC 16, Edingburgh, U.K., June 7-10, 1999. [9] F. Le Faucheur, “IETF Multiprotocol Label Switching (MPLS) Architecture,” Proceedings of the 1st IEEE International Conference on ATM (ICATM-98), pp. 6-15, June 22-24, 1998. [10] F. Le Faucheur, L. Wu, B. Davie, S. Davari, P. Vaananen, R. Krishnan, P. Cheval and J. Heinanen, “MPLS Support of Differentiated Services,” IEFT Draft, http://www.ieft.org/internet-drafts/Draft-ietf-mpls-diff-ext-07.txt, Aug. 2000. [11] O. Hagsand, K. Hanson, I. Marsh, “Measuring Internet Telephony Quality: Where are we today?” Proceedings of the IEEE Global Telecommunications Conference, vol. 3, pp 1838-1842, 1999. [12] A. Kankkunen, G. Ash, A. Chiu, J. Hopkins, J. Jeffords, F. Le Faucheur, B. Rosen, D. Stacey, A. Yelundur, L. Berger “VoIP over MPLS Framework,” IETF Draft, http://www.ietf.org/internet-drafts/draft-kankkunen-vompls-fw-01.txt, Jan. 2001. [13] H. Liu and P. Mouchtaris, “Voice over IP Signaling: H.323 and Beyond,” RFC 2474, NIC, 1998. [14] P. Mishra and H. Saran, “Capacity Management and Routing Policies For Voice Over IP Traffic,” IEEE Commun. Mag., vol. 14, pp. 24-33 ,Mar.-Apr. 2000. [15] Y. Rekhter and E.C. Rosen, “Carrying Label Information in BGP-4,” IETF Draft, http://www.ietf.org/internet-drafts/draft-ietf-mpls-bgp4-mpls-04.txt, Jan. 2000. [16] T. Senevirathne and P. Billinghurst, “Use of CR-LDP or RSVP-TE to Extend 802.1Q Virtual LANs across MPLS Networks,” IETF Draft, http://www.ietf.org/internet-drafts/draft-tsenevir-8021qmpls-01.txt, Oct. 2000. [17] P. A. Smith, B. Jamoussi, D. Fedyk and D. Skalecki, “Improving Topology Data Base Accuracy with LSP Feedback,” IETF Draft, http://www.ietf.org/internetdrafts/draft-ietf-mpls-te-feed-01.txt, July 2000. [18] W. Stallings, High-Speed Networks, TCP/IP and ATM design principles. Upper Saddle River, N.J.: Prentice Hall, 1998. [19] G. Swallow, “MPLS Advantages for Traffic Engineering,” IEEE Communications Magazine, vol. 37, no. 12, pp. 54 -57, Dec. 1999. [20] P. Van Mieghem, “A lower bound for the end-to-end delay in networks: Application to Voice over IP,” Proceedings of Globecom’98, pp. 2508 –2513, 1998. [21] RFC 1771, A Border Gateway Protocol (BGP-4). Internet Architecture Board (IAB), Mar. 1995. [22] RFC 1889, RTP: A Transport Protocol for Real-Time Applications. Internet Architecture Board (IAB), Jan. 1996. [23] RFC 1890, RTP Profile for Audio and Video Conferences with Minimal Control. Internet Architecture Board (IAB), Jan. 1996.

A System Level Framework for Streaming 3-D Meshes over Packet Networks Ghassan Al-Regib and Yucel Altunbasak School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, GA 30332-0250, USA {gregib,yucel}@ece.gatech.edu

Abstract. In this paper, a system-level framework is proposed for 3-D graphics streaming. The proposed architecture is scalable with respect to the variations in both bandwidth and channel error characteristics. We consider the end-to-end system, and jointly optimize pre-processing and post-processing solutions. In particular, forward error correction (FEC) and multiple description (MD) codes are applied to the base-layer mesh; FEC codes are applied to enhancement layer connectivity data; and unequal error protection (UEP) and error-concealment methods are applied to the geometry data. Re-transmission is utilized wherever it is applicable as determined by the delay requirements. Furthermore, the performance analysis of the system is also provided.

1

Introduction

The internet evolves from being a place for users to communicate through media objects into a place where users meet and interact with each other within a virtual world. 3-D graphics applications are the driving force for this “virtual reality over IP” concept. These applications utilize highly detailed 3-D models, giving rise to huge amount of data to be stored, transmitted, and rendered. To alleviate these limitations, several single-layer compression techniques have been developed to minimize the storage space for a given model [1,2]. However, the resulting compressed mesh still requires significant time to be fully downloaded before being displayed on the client’s screen. To reduce this time, progressive compression techniques have been designed so that a coarse representation of the model is downloaded first and then the enhancement layers are streamed out to the client [3,4,5]. In a typical network, there are several factors that considerably affect the quality of the received 3-D mesh. These factors are: 1. 2. 3. 4.

The The The The

bandwidth between the server and the client clients’ graphics card capabilities channel/link packet bit-error characteristics channel/link packet loss characteristics

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 745–753, 2001. c Springer-Verlag Berlin Heidelberg 2001 

746

G. Al-Regib and Y. Altunbasak

The existing 3-D graphics compression techniques are designed to reduce the bandwidth and storage requirements, and do not deal with transmission aspects, hence they only provide a solution for the first and the second constraint. In this paper, we propose a system-level framework that provides a solution considering all these aspects. The research efforts in 3-D graphics are mainly limited to compression and simplification. Not many research efforts have been undertaken to stream out 3D graphics except MPEG-4 related research. However, even MPEG-4 3-D mesh research efforts concentrate on compression and integration with video, but they do not provide error handling methods specific to 3-D graphics streaming and/or transmission. In this paper, we provide a robust 3-D graphics streaming framework that borrows several ideas from existing robust video streaming research, but adapts them for our particular purpose. In particular, we consider server-side pre-processing, network processing and client-side post-processing at the same time, and jointly optimize them.

2

Progressive Compression

Progressive compression schemes can be categorized into two main classes: Wavelet-based [5] and vertex-split-based [3,4] schemes. We adopted the latter class due to its popularity, simplicity and its good performance for a variety of 3-D models. A progressive compression scheme has been proposed by Hoppe [3] for the first time. In his work, Hoppe simplifies a mesh by applying a sequence of edge-collapse operations to arrive at the coarsest mesh M 0 . In practice, this base mesh, M 0 , is first transmitted to the client, and then a sequence of vertex split operations are streamed out until the fully refined mesh, M n , is constructed at the client. These two operations are illustrated in Figure 1. Each vertex split command specifies: i) the new vertex, ii) two new faces, and iii) the attributes of the new vertices and the faces.

Vb Va

Edge collapse

Vc

Vd

Ve Va

Vc

Vertex split

Fig. 1. Edge-collapse and vertex-split commands.

Pajarola and Rossignac [4] improved Hoppe’s work by grouping vertex split operations into batches, where each batch splits half of the previously decoded vertices using edge collapse operations. The encoder works as follows:

A System Level Framework for Streaming 3-D Meshes over Packet Networks

747

1. The base mesh, M 0 , is compressed using a single-level 3-D mesh compression scheme, such as [2]. 2. At each level i, the vertex spanning tree is traversed. If the vertex is split, a bit “1” is inserted; otherwise a bit “0” is inserted into the bit-stream. 3. For the vertex v to be split, the edges are stored clockwise starting from the edge connecting v to its parent in the spanning tree. The pair of indices corresponding to the   two edges affected by the vertex-split operation is encoded using log2 ( d2 ) bits, where d is the degree of vertex v. 4. A prediction algorithm is applied to predict the position of the vertices from the already encoded vertices. The prediction error is then quantized and entropy-encoded. Accordingly, the decoder works as follows: 1. The base mesh is received and decoded. 2. Then, the stream containing the batches (e.g., enhancement layers) is received. The bit-stream is parsed one bit at a time. If the current bit is “0”, then the next bit is read. However, if it is “1”, then the vertex is split, and  the next log2 ( d2 ) bits are decoded to identify which pair of edges are affected by the split. Then, the prediction error is decoded completing the vertex split operation for this particular vertex. 3. Go to step 2 until the bit rate is completely utilized or the whole bit stream is parsed. The time to display the mesh is the time needed to download the base mesh. As it will be shown in the next section, this accounts for less than 10% of the total download time. However, although progressive compression methods produce a bandwidth scalable bit-stream, they are not robust against packet bit-errors and/or packet losses. The next section discusses the proposed error-handling mechanism for streaming 3-D meshes over packet networks.

3 3.1

Error-Handling Framework The Bit-Stream Content

The bit-stream is composed of three main parts as follows: 1. The base mesh data: Typically, simplifying mesh M i+1 to mesh M i reduces the number of vertices by  30% n [4]. Hence, applying n-level batches produces a base mesh, M 0 , with ( 23 ×V ) vertices, where V is the number of vertices in the original 3-D mesh. We used the Touma-Gosta (TG) single-level compression algorithm due to its superior performance upon other algorithms. On the average, this method achieves a compression ratio of 10.4 bits per vertex for both the mesh connectivity and the geometry  n [2]. As a result, the output stream for the base mesh contains (10.4 × 23 × V ) bits. 2. Enhancement layer connectivity data: The batch bi that produces M i+1 from M i contains ( 23 × V ) bits that specify either a vertex is being split or not.

748

G. Al-Regib and Y. Altunbasak d

In addition, this batch contains ( 23 × V × log2 ( 2j )) bits for each vertex d split since the two collapsed edges for a vertex can be encoded by log2 ( 2j ) 1 bits, where dj is the degree of vertex j. Hence, this batch contains ( 2 × 23 × d V × log2 ( 2j )) bits, where the 12 factor accounts for the fact that half of the vertices in M i are split to produce M i+1 . Thus, the total number of bits to represent the mesh connectivity in all batches is n  n−(i−1)  2 i=1

3

×V +

 n−(i−1) d 2 × log2 ( ) × 2 3 2

n  1 i=1

(1)

In practice, 5 bits are adequate to specify the two edges being collapsed per d vertex split. In other words, log2 ( 2j ) in the above equation can be replaced by (5) [4]. 3. Enhancement layer geometry data: Each batch contains bits for the prediction error. The size of this segment is variable due to entropy encoding. Assuming each batch, bi , contains Ei bits describing the geometry information, then the total number of bits in the enhancement bit stream describing n  geometry information is Ei bits. i=1

Table 1 lists these statistics for different 3-D mesh models. The data in the table will be used in performance analysis of the proposed system in the following subsections. 3.2

Error-Handling and Packet Format

According to the bit-stream content-analysis in section 3.1, the base mesh constitute approximately 1-3% of the total mesh data (See Table 1). This portion of the bit stream is of utmost importance, hence, it should be strongly protected against channel degradations and delivered error-free to the client within a certain period of time as specified by the synchronization protocol. We protect the base mesh bit-stream by two mechanisms: i) Reed-Solomon (RS) code against the bit-errors, and ii) multiple description codes (MDC) against the packet losses [6]. MDC is only utilized in cases where packet re-transmission is prohibited due to the stringent time-delay contraints. The enhancement layer mesh connectivity information also needs to be strongly protected against channel errors. Any bit-error and/or packet-loss (in this part of the bit-stream) at a certain level causes catastrophic errors in all subsequent levels. For example, if a single bit describing a vertex split command is received erroneously, then it will cause a considerable distortion in the mesh in all subsequent levels. Therefore, we apply strong channel encoding to the enhancement layer data by utilizing the RS code. However, we do not employ MDC in this case, since the connectivity data constitute a substantial percentage (30%) of the total rate. The packet-errors are handled through re-transmission at the expense of increased delay. However, since the base-layer mesh is already

A System Level Framework for Streaming 3-D Meshes over Packet Networks

749

Table 1. The bit stream content for different models. The numbers in the parenthesis are percentage of the bits in that category to the total number of bits in the bit stream. Model  Levels M 0 Batch-0 Batch-n Total Batches Geometry ( Vertices) (n) (bits) (bits) (bits) (bits) (bits) horse 8 4048 1362 24970 70810 153190 (10811) (1.7) (0.6) (11.0) (31.2) (67.4) skull 8 4101 1380 25300 71730 163940 (10952) (1.7) (0.58) (10.6) (29.9) (68.4) fohe 7 2272 764 9250 25730 80713 (4005) (2.2) (0.75) (9.1) (25.4) (79.4) fandisk 7 3674 1236 14960 41590 99411 (6475) (2.5) (0.85) (10.3) (28.7) (68.6) triceratops 7 1607 540 6540 18190 32718 (2832) (3.1) (1.03) (25.5) (34.6) (62.1) shape 7 1454 489 5920 16460 35236 (2562) (2.7) (0.92) (11.1) (30.9) (66.2) bunny 9 8609 2897 53110 231040 570570 (34834) (1.1) (0.36) (6.6) (28.5) (70.4) phone 10 13545 4558 83560 55360 1144900 (83044) (0.8) (0.27) (4.9) (33.2) (66.8) happy 9 12306 4141 75920 330270 875350 (49794) (1.0) (0.34) (6.2) (27.1) (71.8)

available at the client, the delay induced by the re-transmission of the enhancement layer connectivity data packets is more tolerable to the end-user in most applications. The remaining portion of the bit stream is the geometry information in the batches. Such information constitutes more than 60% of the total bit stream. Here, we propose to utilize unequal error protection (UEP). We label each vertex either as “critical vertex” or “non-critical-vertex” depending on whether its position can be predicted from already decoded vertex locations within a predetermined threshold. Since the non-critical vertex locations can be interpolated, no error protection is applied. On the other hand, “critical vertices” are protected through RS since there is no way of recovering/concealing these vertices. If the synchronization and delay requirements permits, re-transmission is used in all cases. The bit stream is organized as shown in Figure 2. In this figure, RSR, Cbi and Gbi stand for Reed-Solomon Redundancy, enhancement layer mesh connectivity and geometry information in the batch bi , respectively. To prevent error propagation, re-synchronizing codewords are inserted after every batch as well as the base mesh.

750

G. Al-Regib and Y. Altunbasak 2040 bits RSR

M0

RSR

M0

…..

RSR

Base Mesh M0

M0

2040 bits Batches bi's Enhancement"

RSR

Cb

0

Gb

0

Protected

…..

RSR

Cbn

Gbn

Unequal Error Protected

RSR = Reed-Solomon Code Added Redundancy (Parity Check Bits)

Fig. 2. Bit stream format using RS(255, 223) code.

3.3

Performance Analysis

The proposed pre-processing methods, such as FEC and MD codes, provide error-resilience at the expense of increased redundancy. This added redundancy causes an increase in i) the bandwidth requirements, and in ii) the time-delay. Particularly, such delay may considerably affect synchronization among the clients. However, we observe that if the link suffers from packet errors/losses considerably, then the delay induced by the proposed error-resilience methods is much smaller than the delay caused by solely re-transmission based solutions. Furthermore, application of error concealment at the client side to recover the geometry information reduces the re-transmission rate. Table 2 shows the redundancy introduced by employing RS(255, 223) code for a number of 3-D meshes. The last two columns in this table refer to the amount of time consumed by the redundancy added by the FEC for two different links, 56Kbps and 1M bps, respectively. As depicted in Table 2, on a LAN, the redundancy added by the FEC code is in the order of milliseconds while on a 56K-link, the delay is in the range of 0.06 ∼ 1.4 seconds. The latter delay is significant enough to affect the synchronization in some interactive applications. Fortunately, this simple analysis is not an accurate assessment of the proposed system since the bandwidth scalability prevents streaming the whole bit-stream over such a low bandwidth link, but rather the base mesh with the first few enhancement layers are streamed out to the client. This observation leads to the conclusion that the amount of data being streamed out is determined mainly by two factors: i) the allowable delay from the synchronization algorithm, α (in seconds), and ii) the link bandwidth, β (in bps). The number of transmitted bits should be less than (α × β) in our method using the RS(255, 223) code. That is,



n M0 bi (M + 256 × + )) ≤ α × β (bi + 256 × 1784 1784 i=0 0



(2)

The server needs to satisfy the constraint in Equation 2 for each user and the corresponding synchronization and bandwidth requirements. However, the

A System Level Framework for Streaming 3-D Meshes over Packet Networks

751

Table 2. The delay introduced by applying RS(255, 223) on two different links for various 3-D meshes. Model

Added Redundancy Delay on Delay on (bits) 56Kbps (sec.) 1Mbps (sec.) horse 12032 0.21 0.012 skull 12288 0.21 0.012 fohe 5120 0.09 0.005 fandisk 7680 0.13 0.007 triceratops 3840 0.07 0.004 shape 3584 0.06 0.003 bunny 35328 0.62 0.034 phone 82432 1.44 0.079 happy 50688 0.88 0.048

following inequality has to be satisfied to stream out the base mesh: 0

M ≤α×β M 0 + 256 × 1784

(3)

Equation 3 describes both the synchronization and the bandwidth scalability requirements. Note that we do not limit the server to use the RS(255, 223) code. In general, it can choose among several available FEC codes that will satisfy the conditions in Equation 4 and Equation 5:

(M 0 +(n−k)×m×





n M0 bi + )) ≤ α×β, (4) (bi + (n − k) × m × k×m k×m i=0

M 0 + (n − k) × m ×



M0 ≤α×β k×m

(5)

where the RS(n, k, m) code is used. Such a selection guarantees that the client will at least receive a coarse representation of the mesh in the allowable amount of time. Equations 4 and 5 can be re-written in terms of t = n−k to result in Equa2 tions 6 and 7, respectively.



n M0 bi + (bi +16 × t × )) ≤ α×β (M +16×t× 8 × (255−2 × t) i=0 8 × (255 − 2 × t) (6)

0 M ≤α×β (7) M 0 + 16 × t × 8 × (255 − 2 × t) 0



752

G. Al-Regib and Y. Altunbasak

Therefore, the server’s task is to: i) calculate the value of t that satisfies Equation 7 and maximizes the left hand side of the inequality; and ii) continue streaming out as long as Equation 6 is satisfied. Equation 7 is a constrained optimization problems. The optimum t can be computed for a given mesh, bandwidth, and delay parameter by solving this equation. Figure 3 illustrates t versus α for different bandwidths for the 3-D mesh fohe. As shown, for a specific value of α, t is scaled according to the bandwidth so that Equation 7 is satisfied and hence the client receives the base

150

t

100

"fohe" -- 56Kbps

50 0

0

0.5

1

1.5 α

150 100

2

2.5

3

t

"fohe" -- 200Kbps

50 0

0

0.1

0.2

0.3

0.4 α

150 100

0.5

0.6

0.7

0.8

0.1

0.12

0.14

0.16

t

"fohe" -- 1Mbps

50 0

0

0.02

0.04

0.06

0.08 α

Fig. 3. Three plots of t vs. α for three different links for the mesh fohe, which has 4005 vertices. 150

t

100

"phone" -- 56Kbps

50 0

0

2

4

6

8 α

150 100

10

12

14

16

t

"phone" -- 200Kbps

50 0

0

0.5

1

1.5

2

2.5

3

3.5

4

4.5

0.6

0.7

0.8

0.9

α

150 100 t

"phone" -- 1Mbps

50 0

0

0.1

0.2

0.3

0.4

0.5 α

Fig. 4. Three plots of t vs. α for three different links for the mesh phone, which has 83044 vertices.

A System Level Framework for Streaming 3-D Meshes over Packet Networks

753

mesh during the allowable window of time. Similarly, Figure 4 plots the same curves for a more complicated model, the phone mesh. This increase in the number of vertices has an impact of lowering t for the same delay, α, over the same link, β.

4

Conclusion

In this paper, a system-level framework is proposed for 3-D graphics streaming. The proposed architecture is scalable with respect to variations in both bandwidth and channel error characteristics. We consider end-to-end system, and jointly optimize pre-processing and post-processing solutions. In particular, FEC and MD codes are applied at the client-side to the base-layer mesh; FEC codes are applied to enhancement layer connectivity data; and UEP and error-concealment methods are applied to the geometry data. Re-transmission is utilized wherever it is applicable as determined by the delay requirements.

References 1. G. Taubin and J. Rossignac, “Geometric compression through toplogical surgery,” ACM Transactions on Graphics, vol. 17, no. 2, pp. 84–115, April 1998. 2. C. Touma and C. Gotsman, “Triangle mesh compression,” in Proceedings of Graphics Interface, Vancouver, Canada, June 1998. 3. H. Hoppe, “Progressive meshes,” in Proceedings ACM SIGGRAPH’96, 1996, pp. 99–108. 4. R. Pajarola and J. Rossignac, “Compressed progressive meshes,” IEEE Transactions on Visualization and Computer Graphics, vol. 6, no. 1, pp. 79–93, January-March 2000. 5. A. Khodakovsky, P. Schroder, and W. Sweldens, “Progressive geometry compression,” in Proceedings of the on computer graphics, 2000, pp. 271–278. 6. Y. Wang and Q.-F. Zhu, “Error control and concealment for video communication: A review,” in Proceedings of the IEEE, May 1998, pp. 974–997.

Techniques to Improve Quality-of-Service in Video Communications via Best Effort Networks B.E. Wolfinger and M. Zaddach Dept. of Computer Science, Telecommunications and Computer Networks Division Hamburg University, Vogt-K¨ olln-Straße 30, D-22527 Hamburg, Germany Phone: ++49(40)42883 2424, Fax: ++49(40)42883 2345 {wolfinger, zaddach}@informatik.uni-hamburg.de

Abstract. Provisioning of real-time video communication services with sufficiently high quality is getting increasingly important in nowadays computer networks. This task is particularly challenging in the case of the presently typical communication networks which offer their data transport services in a best effort manner, i.e. without any guarantees regarding service quality. This paper classifies the principal techniques for quality improvement in video communications, which can be embedded in a communication network or in dedicated, network-external middleware components. With these techniques we distinguish, on one hand, mechanisms achieving quality improvement by means of local decisions within the sending or receiving endsystem and, on the other hand, mechanisms requiring communication and cooperation between middleware components on both, sending and receiving side. We also emphasize the combined usage of different techniques for quality-of-service (QoS) improvement. In order to judge the current service quality on different layers within the protocol hierarchy we introduce a set of QoS measures for each of the basic service interfaces identified. Finally, we solve the mapping problems between these QoS measures by way of example.

1

Introduction

Transmission of traffic of different type via so-called best effort networks is becoming an increasingly relevant task. Thereby, a complex mix of traffic may result of new kinds of applications, which, besides requiring traditional data communication services (e.g. file transfer), tend to demand transmission of new types of information, such as, speech, audio or video sequences, etc. The typical characteristic of best effort networks is, that they offer their communication and cooperation services without any guarantee regarding the quality-of-service (QoS) being assured a priori by the network. Thanks to their significantly lower complexity as compared to networks providing QoS guarantees (such as ATM networks [20]), presently, best effort communication networks are dominating by far within the class of Local Area Networks with Ethernet and TCP/IP based Intranets as the outstanding representatives. Moreover, also in the class of Metropolitan, Wide P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 754–765, 2001. c Springer-Verlag Berlin Heidelberg 2001 

Improving QoS in Video Communications via Best Effort Networks

755

and Global Area Networks best effort networks are again dominating because the traditional Internet architecture leads to best effort service provisioning. Furthermore, the increasingly important class of mobile communication systems based on wireless transmissions is typically unable, too, to provide QoS guarantees. In best effort networks we need mechanisms to improve the quality of basic communication services in order to thus satisfy the requirements of (human) endusers regarding the quality of application-oriented services with sufficiently high probability. The judgement of quality of a video sequence by a human observer after its transmission in real-time via a communication network is evidently quite subjective, not only dependent on human perception [21] but also on the chosen application domain [5]. Independent of the applications it is possible, however, to identify the following two dimensions which are relevant when judging the quality of media communications at an interface close to the application [17]: – media quality, i.e. in video communications e.g. colour fidelity, sufficiently high video resolution, adequate picture format, no noticeable freezing or corruptions of video sequence (e.g. in case of video frame losses); – media relations, i.e. timing properties within a single stream as well as the timing relations between video and audio streams (e.g. lip synchronization [21]). These relations are not in the focus of this contribution. Therefore, the demand for good quality of a video communication typically implies the following QoS requirements as observed at the communication interfaces close to the enduser: – transfer at a high data rate (yielding to advantages: large picture format, high resolution and frame rate as well as very good color fidelity thus achievable); – strongly limited delay and possibly low delay jitter between originated and displayed video sequence (despite of the real-time requirements for the video communication, low transfer delay may allow retransmissions in case of data packet losses or corruptions respectively); – sufficiently infrequent corruptions of the data units transmitted representing the video stream; – possibly security requirements, which are not subject of this contribution. This paper is concerned with QoS provisioning within real-time video communication systems. At first, fundamental methods for QoS improvement in video communications will be classified by means of an elementary architectural model and most important techniques will be illustrated by way of example (Sect. 2). Besides QoS improvements which result from mechanisms being embedded into the communication network proper, we distinguish improvements resulting from local mechanisms in a communicating endsystem (Sect. 3) and such ones which rely on communication and cooperation between corresponding transformation processes in the sending as well as the receiving endsystem (Sect. 4). We observe that complex interdependencies typically exist between different methods for QoS improvement [2]. In Sect. 5 we introduce QoS measures at various service interfaces and we illustrate how to map these measures onto each other

756

B.E. Wolfinger and M. Zaddach

by way of example. This enables an adaptive and dynamic decision support for QoS management components which have to choose, to adequately combine and parametrize a set of appropriate methods for QoS improvement.

2

Basic Methods for QoS Improvements and Their Embedding in a Video Communication System

In order to support a more in-depth discussion of techniques for QoS improvements in video communications, we now want to introduce an elementary architectural model of a video communication system, including the following main components/constituents: – Human users, interacting with a distributed video application. – A distributed video application, which comprises ≥ 1 video source(s) and ≥ 1 video sink(s); without loss of generality, in the following we will assume exactly 1 source and 1 sink, as multipoint connections just represent some straight-forward generalization. – A communication network, which handles the video communications between communicating endsystems. – Middleware, which improves and/or supplements the functionality and performance of network services in such a way that the requirements (related to functionality and to QoS) of the distributed video application and their users can be satisfied. As a refinement of the middleware component we want to distinguish in particular • application-related middleware (a MW), comprising e.g. functions such as video encoding/compression, • communication-related middleware (c MW), comprising e.g. functions to directly improve the quality of the offered network services in an application-independent manner. – Management component, which receives, interpretes and possibly forwards state information of other main components and coordinates decisions for QoS improvement. We also assume for our architectural model that the (main) components of a video communication system as identified by us are interacting via well-defined interfaces. Thus, we obtain an architectural model as depicted by Fig. 1 including interfaces IF·,α on sending and IF·,β on receiving site. Evidently, we can evaluate the QoS at all of the service interfaces introduced by Fig. 1. This leads to a view which corresponds to the same kind of QoS interfaces as assumed by Zitterbart [25] in her suggested reference model for a QoS classification, if we just identify: – – – –

IF0,· IF1,· IF2,· IF3,·

with with with with

(end)user related QoS, for short: U QoS, application-oriented QoS, for short: A QoS, communication specific QoS, for short: C QoS, and finally, network dependent QoS, for short: N QoS.

Improving QoS in Video Communications via Best Effort Networks Sender

Human User

Endsystem

Video Source

Human User

Uncoded Video Stream (VS)

IF1,α

a_MW IF2,α c_MW IF3,α

Receiver

IF0,β

IF0,α

M A N A G E M E N T

757

Video Sink

Endsystem

IF1,β VS (compressed) embedded into application-oriented data units + a_MW related control info

a_MW IF2,β

VS embedded into transport-oriented data units + c_MW related control info

c_MW IF3,β

Communication Network

M A N A G E M E N T

(e.g. LAN-WAN-LAN interconnection)

Fig. 1. Main components and typical service interfaces of a distributed video communication system

A closer look at the architectural model of Fig. 1 indicates that a QoS improvement may be achieved, in principle, by means of embedding adequate mechanisms into very different parts of the architectural model (components or interfaces), in particular: – at the service interfaces (e.g. at IF2,α or IF3,α by manipulating the stream of data units to be transferred, e.g. “traffic smoothing” [3]); – by local decisions within the main components involved in the process of either sending or receiving the video stream, in particular the middleware (a MW, c MW), e.g. mechanisms to mask the negative impact of data losses during the displaying of the video sequence at the receiver; – by decisions within the middleware components (a MW or c MW) taking into account partner feedback, i.e. status information of the communication partner of the same architectural layer; example for such decisions: forwarderror-correction (FEC) and dynamically increased amount of redundancy on sending side in case of large loss rates as signalled by the receiver [4]; – by some dedicated QoS improvement within the communication network. The emphasis of this paper is placed on those QoS improvements which are achievable by means of adaptive middleware components [13] (cf. details in Sect. 3 and 4). Therefore, the first and last class of mechanisms as introduced above, namely QoS improvement at network-external service interfaces as well as improvements within the communication network proper will only be treated quite shortly in our contribution (mainly in the remainder of this section). Services offered by a communication network to support video communication typically become more valuable from applications point of view, if – the achievable data throughput (e.g. as observed at interface IF3,β in Fig. 1) is increased → increased throughput may be used, e.g., for FEC; – the number of packet corruptions or losses is reduced → this, in general, reduces directly the number of losses of video frames;

758

B.E. Wolfinger and M. Zaddach

– the maximum overall delays in the communication network is reduced → this may be used, e.g., for a smoothing of the video stream by the sender; – the delay jitter in the communication network is reduced → this, in general, reduces buffer requirements in the endsystems. These goals in the desire to increase the service quality of a communication network in the context of video communication can be achieved, among others, by taking the following network-internal actions and measures (cf., e.g., [20]): – use of better technology and of parallel processing (to reduce the service times of data transfer requests or to create gracefully degrading components), – improvement of communication functions (such as routing, error-, flow- or congestion control), – transition from a dynamic resource allocation (e.g. to single packets) to some longer-term resource reservation (e.g. during connection establishment), – control of the behaviour of the network environment, i.e. its service users, at the service access points of the communication network (e.g. giving priorities to data units or to connections,. . .). Amelioration of the quality of the network services per se can be complemented by taking, e.g., measures having already an impact at network-external interfaces, such as: – reduction of the required throughput related to transfer of user data e.g. by reduction of number or size of data units (corresponding, e.g., to video frames) to be transferred or by splitting the overall video stream to be transferred onto different connections (thus reducing the throughput requirement per connection); – giving application-oriented priorities to data units (e.g. according to their importance for the receiver); – smoothing of the arrival process of data units to be transferred (e.g. avoidance of bursts in the time domain as well as those caused by strongly varying lengths of data units); – reduction of time constraints for the execution of data transfers (this may allow to accept a larger limit for maximum delay or delay jitter).

3

QoS Improvement by Means of Local Decisions of Middleware Components

In the remainder of this paper we will restrict ourselves to QoS improvements by using appropriate middleware components. So, what are the kind of networkexternal measures which can lead, in principle, to some QoS improvement in video communications ? We can identify three different ways to achieve ameliorations in service quality: a) By means of network-external decisions, we can try to improve the quality in which the communication network is able to offer its services, e.g.

Improving QoS in Video Communications via Best Effort Networks

759

– the throughput requirements and the load of the network by user data to be transmitted can be reduced as a consequence of external decisions, – the communication network can be informed about different degrees of importance of the data units to be transmitted (e.g. packets, ATM cells). b) By means of network-external measures and actions, we can try to improve (from applications’ point of view) the quality in which the network offered its services by implementing additional service functionality outside the network, e.g. data losses in the network can be masked by using networkexternal FEC. c) We could tolerate insufficient QoS even at an application-oriented interface by taking application-specific reactions, which could hide as much quality degradation as is possible from the human enduser, e.g. a video stream could be temporarily frozen in case of video frame losses. The approaches b) and c) do not try to improve the quality of the network per se, but they try to present an acceptable video quality to the human enduser by dedicated middleware and application-specific reactions. Therefore, following [24], we can denote approaches b) and c) as QoS improvement by means of so-called “smart applications”. If measures of type a) to c) are taken by a middleware component in one and only one of the communicating endsystems, we call this: “QoS improvement by means of local decisions” (as opposed to “decisions with feedback”, cf. Sect. 4). The following important classes of local decisions for QoS improvement, which can be taken at the sending side in the middleware components a MW and c MW (cf. Fig. 1), can be identified : – Information dispersal [1], i.e. splitting of the user data to be transmitted onto several separate connections of the network (the goal being e.g. reduction of the packet loss probability to be expected) → typically implemented as part of c MW. – Giving priorities to data units to be transmitted → e.g. priorities could be associated to video frames to be transmitted dependent on the frame type (by a MW) or priorities could be associated to packets dependent on the relevance of the frame information they contain (by c MW). – Advantageous influencing of load, i.e. the video data to be transmitted → e.g. reduction of load at interface IF2,· , (cf. Fig. 1) by means of varying the factor of quantization, by skipping video frames, by an adequate choice of the Group of Pictures (GOP) patterns in algorithms such as MPEG [21] or favourable partitioning of video frames to be transmitted (“Application Level Framing”, ALF [6]); load reduction at interface IF3,· (e.g., by means of smoothing the video stream to be transmitted). At the receiving side we see the following possibilities to improve QoS by local decisions in middleware components a MW and c MW: – Masking of errors → e.g. in component a MW missing (portions of) video frames could be replaced by means of interpolation using other correctly

760

B.E. Wolfinger and M. Zaddach

received frames or the receiver could freeze the last frame [7,9] as long as (partially) corrupted frames are received. – Usage of playout buffer in a MW in order to eliminate delay jitter at the receiver [8]; basic idea: intentional additional waiting time before starting to display the total video stream (limitations: real-time requirements, size of receiver’s buffer). Evidently, it is possible to further refine the local decisions within the communicating endsystems by taking into account whether the decisions include – only the local state of the middleware component which takes the decision, – the local state and the state of the underlying service interface, – additional information concerning the present state of the communication network, including its present level of service quality offered. It is possible to complement the above-mentioned state information by establishing some feedback to the communication partner of the remote endsystem. Of course, this kind of additional state information provides far-reaching possibilities to improve QoS, which will be discussed in the following section.

4

QoS Improvement by Means of Decisions of Communicating Middleware Components

Middleware components which can coordinate their actions and decisions regarding QoS improvement (in particular by mutually exchanging control information) are thus able to significantly ameliorate quality of a video communication. The possible approaches comprise : – Forward error correction (FEC), both on the level of communicating a MW or c MW components; under appropriate boundary conditions, FEC algorithms allow considerable quality improvements [24]. – Error correction by retransmission [20], again on the level of a MW or c MW components, can be used under the assumption that the application’s realtime requirements and the delays in the communication network still allow the retransmission of data units. – Limitation of error propagation at the receiver (supported by the sender) in particular on the level of communicating a MW components, e.g. by setting checkpoints or taking other actions to limit error propagation such as • appropriate choice of GOP patterns [18] in algorithms as MPEG (cf. above), • horizontal or vertical interleaving of picture data corresponding to subsequent video frames, • synchronization of block groups in algorithms as H.263 [7,9], • adding the feature to decode macro-blocks in reverse order (reverse decoding) [14].

Improving QoS in Video Communications via Best Effort Networks

761

For many of the techniques to achieve QoS improvement in video communications there exist some published studies regarding their inherent potential for quality improvements. However, up to now, only very few studies are available which allow one to judge in detail the potential for QoS improvements of adequately combined mechanisms. Therefore, now we will take a closer look on relationships between QoS measures. These relationships are fundamental when initiating, combining and managing mechanisms to provide fault-tolerance.

5

QoS-Mapping for Adaptive Decision-Support: Some Examples

In the previous sections we have reviewed and classified a variety of quite wellunderstood techniques to improve video transmissions. Yet, if we want to control these mechanisms in order to guarantee some specified video quality, we must be able to evaluate QoS measures on different layers of the protocol/service hierarchy. Furthermore, there exists the necessity to develop methods and calculation algorithms to solve the mutual mapping between QoS measures of neighbouring layers [16]. In this section we are going to suggest a set of QoS measures allowing to express, in a compact way, the service quality at all of the service interfaces as introduced by Fig. 1. We then illustrate by way of example a potential mapping between these QoS measures, in particular from N QoS onto C QoS as well as from C QoS onto A QoS. We will assume that A QoS related measures directly reflect the percepted (subjective) video quality at user level (U QoS), i.e. we can neglect the corresponding mapping problem. 5.1

Mapping of N QoS onto C QoS

Quality of a network, i.e. QoS as observed at IF3,· (cf. Fig. 1), typically refers to delay, delay jitter and loss of data units (e.g. packets, ATM cells) within the network. On transport system level real-time protocols (such as RTP) [20] support and define isochronous media time instances, TS := {tS,i = t0 + νi : i ∈ N} at the interface IF2,α (sender), and TR := {tR,i = t0 + νi + ∆T : i ∈ N} at the interface IF2,β (receiver), where ν denotes the framing frequency, t0 the start of the stream, and ∆T ∈ R+ the real time relationship between sender and receiver. Typically, a video frame is segmented according to an ALF strategy, perhaps protected by FEC and maybe reverse decoding is used. Based on these strategies the loss of single packets directly determines the relative proportion ri of the frame structure being still correctly decodable, ri ∈ [0, 1]. Thus, QoS at IF2,· can be expressed by (∆T , R = (ri )i∈N ). We observe that R is quite hard to handle because one would have to keep a lot of “history”. Therefore, R should be replaced by a new and more compact measure. A good idea seems to be to calculate εi := a ri−1 + (1 − a) εi−1 , where εi represents a transient estimate for that proportion of the actual video frame which is still correct and εi is based on some geometric weighting with parameter a ∈ (0, 1). So we can

762

B.E. Wolfinger and M. Zaddach

consider (∆T , εi ) as an estimate for the current state of the real-time channel at a given time instance tR,i . Comprehensive case studies showed this estimate to be very useful and applicable in a direct and efficient way [15]. In particular, εi can be effectively computed for given packet loss traces corresponding to N QoS measurements. Evidently, definition of εi could be modified to get estimates which are more or less dynamic (e.g. by changing the weighting function). For a particular system we would suggest to choose a definition of estimate εi dependent on network characteristics and on the application context used. In order to limit the expenditure for measurements it would be desirable to measure directly C QoS (rather than N QoS), i.e. to measure ri and then to calculate εi . Estimates (εi )i∈N can then be used to support QoS management decisions both to control behaviour of a MW as well as of c MW. 5.2

Mapping of C QoS onto A QoS

QoS measures regarding A QoS should reflect not only the aspects of video encoding by the application but also should take into account subjective video quality as percepted by the human user. So, it is primarily important to consider in detail the way in which errors propagate within a video sequence. Unless they are corrected by some refreshing of corresponding erroneous portions of a video frame errors remain persistent in future frames and may even be overlayed by later errors. Frame refresh typically is achieved by intra-encoded frames (IFrames), cf. H.26x and MPEG. We will assume that at a distance of n frames such an I-Frame refresh is enforced and, thus, a given frame is affected by the interference at the current media time instance as well as by all the interferences since the last refresh. Therefore, we want to propose a QoS measure ζi which estimates the percepted accumulated interference between two I-Frames I1 and I2 in such a way that the expected interferences estimated at time tR,i , namely εi , is  summed up for all the frames being displayed between I1 and I2 , i.e. n ζi := j=1 j εi = εi 12 n(n + 1). In [22] it is shown that, with a fixed quantization, the measure ζi has a behaviour which is proportional to the mean sum of squared errors (MSE) on picture level. Moreover, the peak signal to noise ratio (PSNR) is just the logarithmic representation of MSE. So, ζi allows to estimate PSNR. This is good news because long term investigations have shown that the PSNR is the best known measure for judging the visual perceptions of human beings [23]. If ∆Enc denotes the overall sum of encoding, decoding and frame processing time on application layer, we can define ∆E := ∆T + ∆Enc . Therefore, an adequate measure for A QoS is given by (∆E , ζi ), if the quantization level used is kept constant. So, we have completed our proposals for QoS measures regarding all the service interfaces we wanted to cover. Thanks to the solutions provided to solve the mapping problems between these measures collection of measurements can be strongly simplified. If a management component is assumed with a global view onto all interfaces it will be sufficient to characterize the state of only one or two interfaces by dedicated measurements - the state of the remaining interfaces can

Improving QoS in Video Communications via Best Effort Networks

763

be approximated by calculations referring to the mapping of QoS measures. QoS management could be performed, e.g., as follows: – An application could specify a certain minimum video quality still acceptable in terms of an A QoS related measure; then, management (MG) could determine the implications for the required quality at C QoS and, finally, the control of a MW and c MW layers could be executed by MG. – As an alternative or just as a supplement, the actual service quality could be measured on N QoS or C QoS interface and, if QoS turns out to be insufficient, MG could directly stimulate adequate reactions by c MW.

6

Conclusion and Outlook

Management decisions to achieve high quality services in video communications via best effort networks should be supported by a variety of techniques for faulttolerance and by other mechanisms used to be able to tolerate an insufficient quality of network services. We have identified a large variety of techniques which allow one to increase the quality of video communications as percepted by human endusers. We also showed that these techniques can be embedded into different layers of a video communication system and we have argued to use not only one but a combination of appropriate techniques. The initiation and usage of adaptive fault-tolerance mechanisms should be based on QoS measures and on models which allow to map these measures between neighbouring layers. We advocated for usage of mechanisms for adaptive fault-tolerance controlled by dedicated QoS management components. For this purpose we introduced a set of QoS measures for various service interfaces including a proposal of how to solve the QoS mapping. Our suggestions for QoS management in video communications, e.g., allow the adaptive video encoding taking into account the estimated (measured and/or calculated) state of the communication network. However, QoS management should not be restricted to reduce or to limit the negative impact of packet losses or intolerably high packet delays on the video stream as displayed by the receiver. In order to be fair to other users of the communication network, QoS management decisions should also try to adapt the load, as it is generated by the controlled application, to the presently observed behaviour of the network. Combining load and error control facilities will be an adequate foundation to keep the video quality at a level acceptable to the enduser, even if best effort networks, such as the Internet, are used.

References 1. Albanese, A., S. Siemsgl¨ uss, B. E. Wolfinger “Information Dispersal to Improve Quality-of-Service in the Internet” Proc. of SPIE Intern. Symp. on Voice, Video and Data Communications, Vol. 3529, Boston (1998) 2. Aurrecoechea, C., A. Campbell, L. Hauw “A Survey of QoS Architectures” Multimedia Systems, Vol. 6, No. 2 (1998)

764

B.E. Wolfinger and M. Zaddach

3. Bai, G., B. E. Wolfinger “Possibilities and Limitations in Smoothing MPEGcoded Video Streams: A Measurement-based Investigation” Proc. of MMB’97, VDE-Verlag, Freiberg (1997) 4. Carle, G. “Error Control for Real-Time Audio-Visual Services” Seminar on High Performance Networks for Multimedia Applications, Dagstuhl, Germany, 1997. 5. Chen, Z., S. M. Tan, R. H. Campbell, Y. Li “Real Time Video and Audio in the World Wide Web” World Wide Web Journal, Vol. 1 (1996) 6. Clark, D. D., D. L. Tennenhouse “Architectural Considerations for a New Generation of Protocols” Proc. of SIGCOMM’90, Philadelphia (1990) 7. F¨ arber, N., B. Girod, J. Villasenor “Extensions of ITU-T Recommendation H.324 for Error-Resilent Video Transmission”, IEEE Communications Magazine, Vol. 36, No. 6 (1998) 8. Ferrari, D., A. Gupta, M. Moran, B. E. Wolfinger “A Continuous Media Communication Service and its Implementation” Globecom ’92 Conf., Orlando (1992) 9. Girod, B., N. F¨ arber, E. Steinbach “Error-Resilient Coding for H.263” D. Bull, N. Canagarajah, A. Nix (eds.) Insights into Multimedia Communications Academic Press (1999) 10. Girod, B., H. Stuhlm¨ uller, M. Link, U. Horn “Packet Loss Resilent Internet Video Streaming” SPIE Visual Communications and Image Processing ’99, San Jose, Invited Paper (1999) 11. Hafid, A., P. Dini “A Quality of Service Degradation Model for Multimedia Applications” 1st IEEE International World Conference on Systems Simulation (WCSS’97), Singapore (1997) 12. Heidtmann K., J. Kerse, T. Suchanek, B. E. Wolfinger, M. Zaddach, “Fehlertolerante Videokommunikation u ¨ ber verlustbehaftete Paketvermittlungsnetze” Kommunikation in verteilten Systemen (KIVS’01), Hamburg (2001) 13. Jacobs, S., A. Eleftheraidis “Adaptive video applications for non-QoS networks” Proc. of the 5th Intern. Workshop on Quality of Service (IWQOS’97), New York (1997) 14. Kamosa, G. “Video Coding and Robust Transmission in Error-Prone Environments”, Technical Report, Univ. of California, Los Angeles (1998) 15. Kerse, J. “Realisierung von Stabilisierungsmechanismen f¨ ur H.261/H.263 codierte Videostr¨ ome in IP-basierten Rechnernetzen”, Diploma thesis, Dept. of. Comp. Sc., Hamburg Univ. (2000) 16. Knoche, H., H. de Meer “Quantitative QoS Mapping: A Unifying Approach” Proc. of the 5th Intern. Workshop on Quality of Service (IWQOS’97), New York (1997) 17. Nahrstedt, K. “Quality of Service in networked Multimedia Systems” in B. Fuhrt (ed.) Handbook of Internet and Multimedia Systems and Applications, CRC Press/IEEE Press (1999) 18. Rhee, I. “Error Control Techniques for Interactive Low-bit Rate Video Transmission over the Internet” ACM SIGCOMM’98, Vancouver (1998) 19. Schneier, B. Applied Cryptography 2nd ed., John Wiley (1996) 20. Stallings, W. High Speed Networks - TCP/IP and ATM Design Principles Prentice Hall (1998) 21. Steinmetz, R., K. Nahrstedt Multimedia Computing, Communications & Applications Prentice Hall (1995) 22. Suchanek, T. “Untersuchung der Bildqualit¨ at u ¨bertragener Videos in ¨ Abh¨ angigkeit von Ubertragungsverlusten und der Qualit¨ atsverbesserung mit Hilfe von Fehlertoleranzverfahren im Empf¨ angerendsystem”, Diploma thesis, Dept. of. Comp. Sc., Hamburg Univ. (2001)

Improving QoS in Video Communications via Best Effort Networks

765

23. VQEG “Final Report from the Video Quality Experts Group on the Validation of Objective Models of Video Quality Assessment” Video Quality Experts Group (2000) 24. Wolfinger, B. E. “On the Potential of FEC Algorithms in Building Fault-tolerant Distributed Applications to Support High QoS Video Communication” ACM Symp. on Principles of Distrib. Comp., PODC’97, Santa Barbara (1997) 25. Zitterbart, M. “High Speed Transport Components” IEEE Network, Vol. 5, No. 1 (1991)

Simulation of a Video Surveillance Network Using Remote Intelligent Security Cameras J.R. Renno1, M.J. Tunnicliffe1, G.A. Jones1, D.J. Parish2 1School of Computing and Information Systems, Kingston University, Penhryn Road, Kingston-on-Thames, Surrey, KT1 2EE, U.K. Tel. +44 (0)208 2000, {J.Renno, M.J.Tunnicliffe, G.Jones}@king.ac.uk 2Department of Electronic and Electrical Engineering, Loughborough University, Ashby Road, Loughborough, Leicestershire, U.K. Tel. +44 (0)1509 227078, [email protected]

Abstract. The high continuous bit-rates carried by digital fiber-based video surveillance networks have prompted demands for intelligent sensor devices to reduce bandwidth requirements. These devices detect and report only significant events, thus optimizing the use of recording and transmission hardware. The Remote Intelligent Security Camera (R.I.S.C.) concept devolves local autonomy to geographically distant cameras, enabling them to switch between tasks in response to external events and produce output streams of varying bandwidth and priority. This paper presents an investigation of the behavior of such a network in a simulation environment, with a view to designing suitable algorithms and network topologies to achieve maximum quality of service and efficient bandwidth utilization.

1

Introduction

The video surveillance market has experienced tremendous growth throughout the 1990s, the bulk of expenditure being in the area of video hardware (cameras, recording equipment, control/monitoring stations). The traditional arrangement of analogue sensors, transmitting via bundled cables to central control monitors under human supervision, is being increasingly superseded by digital multiplexing and transmission of high bandwidth video signals over wireless, ISDN and LAN networks. The fact that a continuous high bandwidth is required, even where the bulk of transmission contains nothing of interest, has led to demands for intelligent algorithms to ease the network load. Intelligent algorithms for video surveillance are now capable of identifying and tracking the trajectories of objects [1], including personnel [2] and vehicles [3,4] against non-stationary backgrounds. The deployment of such algorithms allows the automatic tracking of objects of interest, leaving human operators free to perform other support tasks (such as co-ordinating an appropriate response to any perceived threat). Classes of objects (people, cars, etc.) can be differentiated by their shape and motion characteristics [5] and "suspicious" behaviour can be detected against a baseline of benign activity [6]. Specialised behavioural analysis algorithms [7,8]

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 766–775, 2001 © Springer-Verlag Berlin Heidelberg 2001

Simulation of Video Surveillance Network Using Remote Intelligent Security Cameras

767

require a substantial degree of computational power, and are best employed analyzing those video streams containing events of interest. The Remote Intelligent Security Camera (R.I.S.C.) takes this concept a step further, devolving intelligent algorithms to the cameras themselves and giving them a degree of local autonomy. Cameras are therefore enabled to switch between different tasks in response to external events, generating output streams of varying bandwidth and priority. For example, while tracking objects exhibiting "normal" (nonsuspicious) behaviour, the camera may produce a semantic textual data stream describing trajectories and behaviour. Once a threat has been detected, a mediumquality high-priority video report will be generated for the immediate attention of human operators. In addition to this video report, a high-quality forensic standard video record may be generated and stored locally. The aim of this project1 is to investigate the behaviour of such a network in a simulation environment, using statistical algorithms to mimic the behavior of the cameras, network and security-operators. The results of these simulations should produce a clearer understanding of the traffic/network interaction, thus aiding the development of the algorithms and topologies required to achieve maximum quality of service (QoS) and bandwidth utilization efficiency.

2

Experimental Methodology

The simulation software used in this study was written in Microsoft Visual C++, and runs upon an 850MHz Pentium III PC. The program contains modules representing the network architecture (which was assumed to be a broadband fibre-based network), the intelligent cameras and the central control/monitoring station. The latter is usually referred to as the "in-station" of the network, while the video cameras are the "outstations". The network nodes are described as "mid-stations"; each services a cluster of out-stations (cameras) and reports to/receives commands from the central in-station (see Figure 1). 2.1

Network Architectures and Protocols

2.1.1 Asynchronous Transfer Mode (ATM) The Asynchronous Transfer Mode (ATM) network protocol typically runs at 155Mbit/s, and carries data in 53 octet "cells" (48-octet data field plus a 5-octet header). Data is transferred on a connection-based scheme in which all cells in a particular stream follow a common "virtual channel connection" (VCC) through the network. Each node (or “switch”) in an ATM network has a series of input and output ports: Cells arriving at a particular input port are interrogated for the "virtual channel identifier" (VCI) in the header field, which is used to select the appropriate output port for that cell. (The mapping between VCI's and port numbers is specified in a switching table, which is initialized when the connection is established.) The switch also contains storage buffers to hold cells until the output ports are ready for them. 1

The project is funded by the Engineering and Physical Sciences Research Council.

768

J.R. Renno et al.

These buffers are FIFO (first-in-first-out) may be either on the input or the output ports of the switch. Outstations (Camera Cluster) Outstations (Camera Cluster) Outstations (Camera Cluster) MidStation MidStation

MidStation

INSTATION (Video Monitor /Controls)

Fig. 1. Typical video surveillance architecture, with "out-stations" (camera sensors), "mid-stations" (network nodes/switches) and in-stations (central monitoring/control node (after Nche et al. [9]). ATM Cell: 53 bytes HEADER

(including VCI)

5 bytes

PAYLOAD

48 bytes

O U T P U T S

I N P U T S

ATM Switch

Fig. 2. ATM cell (left) and switch architecture (right). The broken line indicates a virtual channel connection (VCC) between an input port and an output port of the switch, along which all cells in a particular stream travel. Many interconnected switches form an ATM network. 2.1.2

ATM "Active Bus" Architecture

Although ATM provides an ideal platform for video surveillance, its complete implementation would be an unnecessary expense. For this reason, workers at Loughborough University have developed a functional subset of ATM specifically for surveillance applications [9]. Figure 3 shows the basic architecture: Data cells flow both ways along the bus, camera output data in one direction and camera control data

Simulation of Video Surveillance Network Using Remote Intelligent Security Cameras

769

in the other. Each cluster of cameras (out-stations) is connected to a mid-station which contains an "M" (multiplex) box and a "D" (de-multiplex) box. The M-box allows the cell-streams generated by the cameras to be merged together with those already on the network. It also contains FIFO buffers to store cells temporarily during periods of congestion. (When this buffer becomes full, any further cells entering the M-box are dropped from the network.) The D-box allows control cells intended for a particular camera to be de-multiplexed out of the bus and to reach their required destinations.

Camera Control

M Mid Station D

Camera Output

M Mid Station D

M Mid Station D

In Station

Fig. 3. Simplified illustration of the "active bus" video surveillance network architecture developed at Loughborough University [9], upon which the simulation experiments in this paper are based. This architecture is clearly an example of an ATM network. The video, text and control streams of each camera form VCC’s and the M- and D-boxes may be considered ATM switches. While the M-box has many input ports and one output port, the D-box has multiple outputs and one input. The network simulator used in this study operates at “cell-level”: The progress of each cell is tracked by the computer and cell transfer delay distributions are recorded. Most of the experiments assumed input-port buffering, though output buffering was also tested. The simultaneous arrival of multiple cells in an M-box necessitates a priority assignment system, and two such schemes were tested: (i) All incoming cells were given equal priority and were selected at random for forwarding. (ii) Cells arriving from the upstream mid-station were given automatic priority over those arriving from local cameras, in order to compensate for their longer journey to the instation. Furthermore, each control cell generated by the in-station is destined for a specific camera; there are no broadcast/multicast cells.

770

J.R. Renno et al.

Cumulative Probability

1.2 1 0.8 Actual Data

0.6

Model

0.4 0.2 0 0

500

1000

1500

Event Separation (Video Frames)

Fig. 4. Cumulative probability graph for time-separation of events in a video camera sequence. (The field of view was a staff car park at Kingston University.) The near-fit exponential justifies the use of a Poisson process to model the report-generation mechanism. The average time between events is 278 PAL frames, or approximately 11 seconds. 2.2

R.I.S.C. Cameras

In order to mimic the operation of a R.I.S.C. camera, some preliminary experiments were performed using a 20 minute video sequence of a car park. The sequence was examined frame-by-frame for “significant events” of the sort which might be detected by an intelligent algorithm (e.g. “car enters car park”, “cyclist leaves car park”). The times between the end of each event and the onset of the next was recorded and the results were plotted as a cumulative probability graph. Figure 4 shows that this data approximately follows a curve of the form

F (t ) = 1 − e − λt

(1)

where λ is the reciprocal of the mean inter-event time. This indicates that the probability of event-occurrence is governed by a Poisson distribution. Hence a Poisson process was implemented in the simulation program to mimic the eventreport mechanism. At this stage in the project, several simplifying assumptions have been made concerning the camera output characteristics. When no video report is generated, each camera is assumed to send a low bandwidth, constant bit-rate (CBR) text stream to the in-station. When a video report is generated, the camera sends a higher bit-rate video stream, together with a message informing the in-station that a video report has arrived.

Simulation of Video Surveillance Network Using Remote Intelligent Security Cameras

771

Probability Density (Per Second)

Gaussian Stand-Down Distributions 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0

2

4

6

8

10

12

Stand-Down Delay (s)

Fig. 5. Gaussian distributions used to model stand-down delays in reported simulations using means are 2 and 4 seconds (standard deviations are one third of these values). These may be seen as representing the responses of alert and sluggish operators respectively.

2.3

The In-station

Upon receiving a video report, the in-station waits for a randomly selected period of time before responding. This is the "stand-down delay" and represents the time required by the security operator to analyze and identify the reported event. Once the stand-down delay has elapsed, the in-station sends a control cell to the reporting camera instructing it to stand-down (i.e. to terminate its video report). When the camera receives this message, it resumes the low bit-rate CBR transmission prior to the video report. The process of identifying the reported object/event is likely to require a period of cogitation, the Poisson distribution is an unsuitable representation of the stand-down process. Stand-down delays are likely to be clustered symmetrically around a central mean value, and for this reason a Gaussian distribution was chosen. While the mean of this distribution was a user-adjusted parameter, the standard deviation was set to exactly one third of the value. Figure 5 shows Gaussian curves for mean stand-down delays of 2 and 4 seconds (representing more alert and more sluggish security operators respectively.)

772

3

J.R. Renno et al.

Experimental Results

Throughout these experiments, the physical layer speed was assumed to be 155Mbit/s, which is typical for fiber-based ATM. The video-report bit-rate was set to 15Mbit/s and the standby “test” data rate was 80kbit/s. The network buffers were dimensioned such that no cells were dropped due to buffer-overflow. (Typical loss rate on a well9 dimensioned ATM network is of the order of 1 cell in 10 transmissions.) Network performance was quantified in terms of the cell transfer delay distributions, which could be determined for the network as a whole and for individual camera streams. All simulations were run for 500 seconds (simulated time) which was found sufficient to ensure statistically significant results. This was verified by performing multiple simulations with identical parameters and comparing the respective outcomes. 3.1

Network Topology

The first set of experiments investigated the effects of network topology upon the quality of service. Figures 6 and 7 shows the effects of adding more cameras and midstations to an existing network; the larger the network becomes, the greater the traffic load and the longer the average cell delay. (In these experiments, the inputs to each M-box were assumed to have equal priority.)

100000000

Mid2Cam3 Mid3Cam3 Mid4Cam3

10000000 Number Of Cells

1000000 100000 10000 1000 100 10 1 1

2

3

4

5

6

7

8

9 10 11 12 13 14 15 16 17 18 19 20

Cell Delay (ATM Cycles)

Fig. 6. Cell delay distributions for entire data on networks of 2, 3 and 4 mid-stations (Mid2Cam3, Mid3Cam3 and Mid4Cam3 respectively). Each mid-station services three cameras. Mean inter-event time was 11 seconds and mean stand-down time was 6 secs.

Simulation of Video Surveillance Network Using Remote Intelligent Security Cameras

773

100000000 3Mids2Cams 3Mids3Cams 3Mids4Cams

Number Of Cells

10000000 1000000 100000 10000 1000 100 10 1 1

2

3

4

5

6

7

8

9

10 11 12 13 14 15

Cell Delay(ATM Cycles)

Fig. 7. Cell delay distributions for entire data on networks of 2, 3 and 4 cameras per mid-station (3Mids2Cams, 3Mids3Cams and 3Mids4Cams respectively). All three networks contained 3 mid-stations. Mean inter-event time was 11 seconds and mean stand-down time was 6 secs.

10000000 Mid1Cam Mid2Cam Mid3Cam mid4Cam

Number Of Cells

1000000 100000 10000 1000 100 10 1

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Cell Delay (ATM Cycles)

Fig. 8. Cell delay statistics for video-stream cells from four individual cameras on a network of four mid-stations. Mid1Cam and Mid4Cam are cameras on the midstations closest to and furthest away from the in-station respectively.

Figure 8 shows cell-delay distributions for individual cameras at different points in a network. It is noticeable that the cameras further away from the in-station experience longer delays, since their cells have further to travel to the in-station. This experiment was repeated, giving automatic priority to cells from upstream mid-stations (Fig.9).

774

J.R. Renno et al. 10000000 Mid1Cam Mid2Cam Mid3Cam Mid4Cam

1000000 100000 10000 1000 100 10 1 1

3

5

7

9

11

13

15

17

19

21

23

25

27

29

Fig. 9. The experiment of Figure 8 repeated, giving automatic priority to all cells from “upstream” mid-stations to compensate for their longer journey.

100000000 RepGenMeanTime = 11 RepGenMeanTime = 15 RepGenMeanTime = 20

10000000

Number Of Cells

1000000 100000 10000 1000 100 10 1 1

2

3

4

5

6

7

8

9

10

11

12

13

Cell Delay(ATM Cycles)

Fig. 10. Cell-delay distributions obtained using 11, 15 and 20 seconds mean inter-event time (RepGenMeanTime).

3.2

Network Activity

Figure 10 shows the results of another simulation experiment, in which the effect of changing the level of network activity was observed. In all cases, the network consisted of three mid-stations, each of which served a cluster of three cameras. The mean time between events (RepGenMeanTime) was set to 11, 15 and 20 seconds and the effect upon the cell delay distributons was observed. The results show that the greater network activity associated with a shorter inter-event time increases the overall load on the network and increases the average cell delay.

Simulation of Video Surveillance Network Using Remote Intelligent Security Cameras

775

4 Conclusions and Future Work This paper has outlined some of the recent trends in the development of video surveillance networks, and shown the benefits of building intelligence into individual camera sensors. A simple cell-level simulator of a network of intelligent cameras, based upon an ATM “active bus” architecture has been established and tested. This simulator has then been used to explore the effects upon QoS of different network topologies and video-report generation frequencies. A number of assumptions have been made in the formulation of the model; firstly the arrival of events observed by each camera has been assumed to be random and uncorrelated, and therefore governed by a Poisson process. (This assumption was partially justified by observation of a limited data set.) A further assumption is that no correlation between events detected by different cameras; each is governed by an independent statistical process. This is likely to be untrue in practice, since a single suspicious vehicle or individual would almost certainly be detected by more than one camera; hence the arrival of an event on one camera would increase the likelihood of an event on neighbouring cameras. These results provide a foundation for a more realistic simulation study, which should ultimately allow recommendations to be made about optimum network configurations.

References 1. Owell,J, Remagino,P, Jones,G.A.: From Connected Components to Object Sequences. Proc. 1st. IEEE International Workshop on Performance Evaluation of Tracking and Surveillance. Grenoble, France, 31 March (2000) 72-79 2. Iketani,A, Kuno,Y, Shimada,N, Shirai,Y.: Real-Time Surveillance System Detecting Persons in Complex Scenes. Proc. 10th. International Conference on Image Analysis and Processing. Venice, Italy, 27-29 Septtember (1999) 1112-1117 3. Harrison, I, Lupton,D.: Automatic Road Traffic Event Monitoring Information System ARTEMIS. IEE Seminar on CCTV and Road Surveillance (1999/126), London, U.K., 21 May (1999) 6/1-4 4. Collinson,P.A.: The Application of Camera Based Traffic Monitoring Systems. IEE Seminar on CCTV and Road Surveillance (1999/126), London, U.K., 21 May (1999) 8/1-6 5. Haritaoglu,I, Harwood,D, Davis,L.S.: Active Outdoor Surveillance. Proc. 10th. International Conference on Image Analysis and Processing. Italy, 27-29 September (1999) 1096-1099 6. Thiel,G, "Automatic CCTV Surveillance - towards the VIRTUAL GUARD", Proc. 33rd. International Carnahan Conference on Security Technology, Madrid, Spain, 5-7 Oct., pp.428, 1999. 7. Remagnino, P., Orwell, J., Jones, G.A., "Visual Interpretation of People and Vehicle Behaviours using a Society of Agents", Congress of the Italian Association on Artificial Intelligence, Bologna, pp. 333-342, 1999. 8. Orwell, J., Massey, S., Remagnino, P., Greenhill, D., Jones, G.A., "Multi-Agent Framework for Visual Surveillance", IAPR International Conference on Image Analysis and Processing, Venice, pp. 1104-1107. 1999. 9. Nche,C.F., Parish,D.J., Phillips,I.W., Powell,W.H., "A New Architecture for Surveillance Video Networks", International Journal of Communication Systems, 9, pp.133-42, 1996.

Cooperative Video Caching for Interactive and Scalable VoD Systems Edison Ishikawa1,2 and Claudio Amorim1 1

COPPE - Systems Engineering and Computer Science Program, Federal University of Rio de Janeiro, Centro de Tecnologia H-318 Ilha do Fundao, Rio de Janeiro, RJ, Brazil, CEP 21945-970 {edsoni,amorim}@cos.ufrj.br 2 Military Institute of Engineering, IME Rio de Janeiro, RJ, Brazil http://www.ime.eb.br [email protected]

Abstract. In this work, we introduce a novel technique called Cooperative Video Caching (CVC) that enables scalable and interactive Videoon-Demand (SI-VoD) servers to be developed. The key insight of CVC is to exploit the client buffers as a large global distributed memory that can be randomly accessed over the communication network. CVC uses patching and chaining but in such a way that minimizes communication traffic, eliminates the chaining interruption problem, and most important, enables VCR-like interaction. Through detailed CVC simulations our results show that CVC-based servers are potentially scalable. In addition, we show that interactive CVC servers significantly outperform conventional interactive VoD servers. These preliminary results suggest that CVC is a promising technique to develop SI-VoD servers

1

Introduction

Video-on-demand (VoD) systems offer a promising solution for delivering videobased applications in important areas such as Distance Learning and Home Entertainment. To date, current VoD implementations support only a limited amount of clients, which restrict the widespread use of VoD applications. Therefore, multicast-based Near-VoD systems (N-VoD) [4,6,1] have been proposed, as a scalable solution. However, N-VoD systems faces the problems that client requests may have to wait for the next appropriate video multicast, and offer restricted interaction rather than VCR-like operations. Alternatively, the VoD scalability problem can be addressed by exploiting the extra communication bandwidth at the client (machine) side, using techniques such as patching [7] and chaining [9]. The key idea behind such techniques is to allow the vast amount of video that is stored in the client buffers throughout the system to be reused to generate new video streams in such a way that reduces server occupancy and improves significantly the system throughput. However, P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 776–785, 2001. c Springer-Verlag Berlin Heidelberg 2001 

Cooperative Video Caching for Interactive and Scalable VoD Systems

777

such schemes have two main drawbacks: (1) The amount of traffic generated over the network can grow explosively; and (2) VCR-like interaction is not supported. In this work, we introduce a new technique called Cooperative Video Caching (CVC) that exploits also the client buffers but in a novel way. First, CVC organizes all the client buffers as a large global distributed memory [5,2,11,10] that can be randomly accessed over the communication network. Second, CVC uses patching and chaining but in a different and efficient manner. More specifically, CVC implementation introduces three distinct features: (1) Clients instead of servers can send patches between them; (2) Chaining is implemented in such a way that minimizes communication traffic, and (3) CVC eliminates the chaining interruption problem [9]. In addition, CVC enables VCR-like interaction whereas current schemes do not. CVC requires the use of digital broadband communication networks 1 where each client can receive and transmit video streams. In this way, CVC-based VoD servers are ideal to small-to-large size audiences that can be found in academic and enterprise environments where desktop computers are typically interconnected by high-speed networks with symmetrical access. The remainder is organized as follows. The next section describes CVC and its mechanisms that support scalable and interactive VoD servers. Section 3, presents our experimental methodology and discuss simulated performance results. Finally, section 4, presents our conclusions and outline future works.

2

Cooperative Video Caching

In this section, we describe the CVC technique that manages all the client buffers as a single global distributed memory. For this purpose, CVC uses the group of frames (GoF) as the memory access unit, organizes the client buffers as a single distributed memory over the network, and introduces a new scalable and interactive VoD protocol that implements the cooperative video caching, as described next. 2.1

CVC Access Unit

A GoF [8] is a self-contained video unit in which all the required information to decode the GoF is stored within the GoF structure. In addition, each GoF has a timestamp associated with, which CVC uses to randomly address GoFs within a video stream. In this way, GoF timestamps can be used within video streams like word addresses in a RAM. 2.2

The Client Buffer Organization

In a VoD system, the client buffers store GoFs to deal with system jitter. CVC extends the control of client buffers so that other clients can share all the buffer 1

This is one of the networks described in VoD specification [3]

778

E. Ishikawa and C. Amorim GoF GoF GoF GoF GoF GoF GoF GoF GoF GoF GoF

start

begin

read

low

write

high

end

Fig. 1. CVC organization of a client buffer

contents. Figure 1 shows the client buffer organization in CVC. As can be seen, seven control pointers implement the buffer control structure. The start and end pointers define the first and last locations in the buffer. The write and read pointers indicate the buffer positions to store and show the next GoF, respectively. The begin pointer defines the location of the earliest received GoF and is updated whenever a GoF is discarded. The low and high pointers determine the minimum and maximum buffer levels at which warnings are sent to the CVC manager that will take appropriate actions to prevent either buffer underflow or overflow, accordingly.

2.3

CVC Basic Protocol

Given the client buffer organization and access modes, let us describe the basic CVC implementation. Also, consider the case of a single-video server, for the sake of simplicity. On arriving the first request the server will start transmitting a new video stream to the client. As soon as the client buffer reaches its minimum level it will start showing the movie (figure 2(a)). So far, CVC behaves like an ordinary server.

Client 1

Client 1 the collaborator

buffer

Standard stream

Client 2 the requester

Video Server or Client the provider

Video Server or Client

t

0

Patch stream

buffer

Standard stream

buffer

0

t

relative initial time for both clients

(a) First client arriving

(b) After some time the second client arrives

Fig. 2. The use of Patching in CVC

Cooperative Video Caching for Interactive and Scalable VoD Systems

779

When a second request arrives, the CVC manager looks up its table for a client, called the provider, that holds the video initial part (VIP) in its local buffer (figure 2(b)). To determine whether or not a client holds the VIP the server needs to estimate how much time of video stream is left within a client buffer. Let tb be the amount of video stored in a client buffer in seconds2 . A provider is a client that received the first video GoF at most tb seconds before the second request arrival time. If there is more than one provider, CVC selects the one that its relative initial time is tb /2 seconds smaller than the current time. In this case, the provider will insert the requester into its multicast group. Also, as the requester missed the VIP, another client of the multicast group, called the collaborator, will provide the VIP to the requester. In case of no such a provider be available, then the last client that received the VIP at less than tb seconds becomes the provider and implements the chaining that links its buffer to the requester buffer (figure 3). Otherwise, the server will start a new video stream that is transmitted to the requester.

buffer Video Server

0

35

70

105

t(s)

Fig. 3. Optimized Chaining in CVC

Whenever a provider fails silently, its client will consume GoFs until reaching the buffer’s minimum level at which the CVC manager either determines another provider or starts a new video stream (figure 4). As a result of earlier detection of video underflow, the client will have GoFs to show while CVC searches for a new provider, thus solving the interrupt chaining problem in a simple and efficient way. The pause operation is also simple to implement in CVC. If the requester that issues a pause is in a tree leaf then the solution is trivial. If the requester is a provider (figure 4), the CVC manager will walk towards the root until it finds the next client, which is the provider of the current provider. If there are other clients in the provider’s multicast group, CVC chooses one from the group as the new provider. 2

Note that the size tb and tb /2 are a trafeoff between using the multicast stream in full against making long pathces or limiting the multicast to transmit shorter patches

780

E. Ishikawa and C. Amorim

buffer Video Server

fail provider pause provider

0

35

70

t(s)

105

Fig. 4. Client’s failure or pause operation in CVC

When a client sends a resume command to the CVC manager, it starts showing the video using the GoFs stored in the client’s buffer. At the same time, CVC traverses the chain towards the same stream direction until it finds a provider that has approximately the same elapsed time from the beginning of the movie (figure 5), and defines it as the new provider. Note that the client has from now on a new initial time, which corresponds to the current time less the timestamp time of the last received GoF. Most important, only if the chain ends before CVC finds a new provider, the server will start a new video stream.

buffer Video Server

pause patch resumed 0

35

70

105

t(s)

Fig. 5. Resume operation after 70 seconds

2.4

The CVC Interactive Protocol

CVC implements fast forward (FF) and rewind (RW) operations either in a discrete or continuous mode. In the discrete mode, CVC uses the average MPEG1 throughput to determine how many GoFs it needs to either forward or backward depending on whether the operation is FF or RW. For a small number of GoFs the buffer size suffices. Otherwise, CVC must find a new provider that holds the video stream at the selected point (figure 6).

Cooperative Video Caching for Interactive and Scalable VoD Systems

Video Server

ff

781

ff rw

rw

0

Fig. 6. Discrete ff/rw operation in CVC

The implementation of continuous FF/RW operations is similar to the discrete ones. The only difference is that while traversing the chain CVC will request and show buffer contents along the way to the client (figure 7).

burst Video Server

ff

burst

ff rw

rw

0

Fig. 7. Continuous ff/rw operation in CVC

3

Experimental Methodology

In this paper we present preliminary performance results based on CVC simulations that assume the following system configuration: (1) Servers and client stations are interconnected by an ATM network; (2) The network topology is fully connected; and (3) The network implements a deterministic service. Table 1 summarizes system workload and simulation parameters, with associate standard values and/or value range when appropriate. It is important to notice that the parameter values we chose allow us to examine the scalability of CVC at a relatively low transmission speed, using low-cost servers and basic client resources.

782

E. Ishikawa and C. Amorim Table 1. Simulation parameters Parameter Standard Range Video length (seconds) 3600 3600 e 7200 GoF average size (seconds) 1s Logic channel (server bandwidth) 100 Client buffer size (seconds) 80 Request rate (requests/min) 0.5-60 Number of clients 60 - 14400 Average time between interactions (seconds) 90 Pause probability 5% Pause duration (seconds) 1-600 -

The following performance measurements were used: – Blocking rate: It is the percentage of initial requests that are blocked due to the unavailability of logical channels. – Failure rate: It is the percentage of clients that experimented glitches. – Average throughput: It is the average number of multicast streams in the system required to serve all the users. – Utilization rate: It is the percentage of busy logical channels. The CVC simulator was implemented in ANSI C++. Each simulation runs for two hours, the prime time duration. All the measurements have an estimate confidence level of 90%. 3.1

Performance Comparison

Figure 8 show server throughput versus request rates using four approaches: conventional, chaining, multicast, and base CVC (non-interactive). They show that a conventional system saturates at a request rate above two requests/minute, since all the logical channels become quickly busy. Chaining allows server throughput to grow linearly as the request rate increases, since it is not limited by the number of logical channels in the server nor the server access link bandwidth, though it requires increasingly network bandwidth. The multicast system uses less bandwidth than both conventional and chaining schemes, but multicast server workload is higher in comparison with base CVC. 3.2

Interaction Effects on CVC

To evaluate CVC behavior under VCR operations, we also simulated the pause and resume operations using simple algorithms that can search video providers from any point of the movie, based on techniques described in previous section. Due to lack of space, our sole intention is to give an idea of CVC viability for interactive VoD servers. Therefore, we report results only for the algorithm that

Cooperative Video Caching for Interactive and Scalable VoD Systems

783

600

Throughput

500

conventional multicast chaining base CVC

400 300 200 100 0

0

2 (a)

4 6 requests/minute

8

10

8

10

100

Utilization rate (%)

80 60 40 conventional multicast chaining base CVC

20 0

0

2

4 (b)

6

requests/minute

Fig. 8. (1) Throughput x Request rate, (2) Utilization rate x Request rate

selects providers from a list of candidates so that existing chains are not much disturbed. Overall, they show good results, but interactive CVC performance was far from the ideal non-interactive CVC performance. We compared interactive CVC against conventional server with interaction, since the latter permits also VCR operations. The results are plotted in figure 9. As we expected, the figures shows that interactive CVC is much better than the conventional approach. Also, the interactive CVC block rate is low, though the glitch rate becomes high around and above 3 requests/minute. Finally, we compare utilization rates between interactive and non-interactive CVC. The results confirm that interactive-CVC has much higher rate, which suggests that large performance gains can be obtained by employing more efficient searching algorithms in the interactive CVC.

4

Concluding Remarks

We propose and evaluate a novel technique called cooperative video caching that enables scalable VoD servers with VCR facilities to be developed. The CVC

784

E. Ishikawa and C. Amorim 100

Blocking rate (%)

80 60 40 conventional base CVC CVC with VCR

20 0

0

2

4

6

8

10

8

10

8

10

(a) requests/minute 100

Failure rate (%)

80

conventional base CVC CVC with VCR

60 40 20 0

0

2

4

6

(b) requests/minute 100

Utilization rate (%)

80 60 40 conventional base CVC CVC with VCR

20 0

0

2

4

6

(c) requests/minute

Fig. 9. (1) Block rate x Request rate with interaction, (2) Glitch rate x Request rate with interaction, (3) Utilization rate x Request rate with interaction

distinguishing feature is the use of client’s buffers not only as a delay line, but also as a single view of memory space that can be managed in a cooperative way. Our preliminary results show that non-interactive CVC is better than previous schemes. Only CVC and conventional VoD offer VCR operations and the results indicate that interactive CVC performs much better. Overall, the results we obtained are very encouraging and we plan to further investigate CVC under

Cooperative Video Caching for Interactive and Scalable VoD Systems

785

more realistic conditions for network access, statistical service, communication traffic, and other network topologies.

References 1. K.C. Almeroth and M.H. Ammar. The Use of Multicast Delivery to Provide a Scalable and Interactive Video-on-Demand Service. IEEE Journal on Selected Areas in Communication, 14(6):110{1122, august 1996. 2. T. Anderson, M. Dahlin, R. Wang, and D. Patterson. Cooperative caching: Using remote client memory to improve le system performance. In USENIX OSDI, pages 267{280, november 1994. 3. ATM Forum. Audiovisual Multimedia Services: Video on Demand speci cation 1.1, 1997. af-saa-0049.001. 4.

A. Dan, D. Sitaram, and P. Shahabuddin.

Dynamic batching policies for an on-

demand video server. Multimidia Systems, 4:112{121, 1996. 5.

M.J. Feeley and et all. Implementing global memory management in a workstation cluster. In 15th ACM Symposium on Operating Systems Principles, december 1995.

6.

L. Golubchik, J.C.S. Lui, and R.R. Muntz. Adaptative piggybacking: a novel technique for data sharing in video-on-demand storage servers.

Multimidia Systems,

4:140{155, 1996. 7.

K.A. Hua, Y. Cai, and S. Sheu. Patching: A Multicast Technique for True Videoon-Demand Services. In ACM Multimedia'98, pages 191{200, Bristol, UK, 1998.

8.

ISO/IEC. Information Technology - generic coding of moving pictures and associ-

ated audio - part 2: Video, 1995. ISO/IEC Standard 13818-2. 9.

S. Sheu, K. A. Hua, and W. Tavanapong. Technique for Video-on-Demand Systems.

Chaining: A Generalized Batching

In IEEE International Conference on

Multimedia Computing and Systems, Ontario, CA, 1997. 10.

Gnutella's Home Page. http://gnutella.wego.com.

11.

Napster's Home Page. http://www.napster.com.

Optimal Dynamic Rate Shaping for Compressed Video Streaming Minjung Kim and Yucel Altunbasak School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, GA 30332-0250 {minjung,yucel}@ece.gatech.edu

Abstract. The available channel bandwidth may vary due to many factors including network traffic congestion. Therefore, a video server should be able to decide how to reduce the transmission rate so as to maximize the signal quality at the receiver. The video encoder can scale the spatial resolution, temporal resolution or SNR to decrease the rate. In this paper, we study which option or which particular combination of these three scalability options needs to be employed to maximize the perceived signal quality for a given video sequence. The existing research in this area primarily concentrates on down-conversion of MPEG video by frame-dropping or by changing the quantization scale factor as opposed to considering the full spectrum of scalability options.

1

Introduction

In recent years, the rapid growth in popularity of Internet applications has lead to demand for network based streaming applications including distance learning, video database browsing, Internet TV broadcasting, and video-on-demand systems. To enable these media streaming applications, several issues need to be addressed. In particular, in this paper, we will concentrate on two problems: 1. The channel bandwidth may vary due to many factors including network traffic congestion or deep fading (in wireless networks). The bandwidth available to stream the media fluctuate significantly unless the network provides Quality of Service (QoS) guarantees. 2. Multimedia services need to be bandwidth scalable to accommodate a wide range of connection technologies. A T1-line allows the video to be streamed out at a rate in the order of Mbps whereas a dial-up modem connection only allows streaming at a rate upto 56Kbps. To overcome these challenges, the video bit-rate needs to be adjusted at appropriate places (e.g., a server or a gatekeeper) in the network. For example, a server may cut down streaming rate to alleviate the congestion problem in accordance with a congestion-control protocol; or the video rate needs to be down-scaled at a gatekeeper if the client has a 56Kbps connection whereas the original video is P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 786–794, 2001. c Springer-Verlag Berlin Heidelberg 2001 

Optimal Dynamic Rate Shaping for Compressed Video Streaming

787

1.5Mbps MPEG-1 video. In both examples, video rate is controlled dynamically adapting to the changes in the network condition so as to maximize the signal quality at the receiver. The rate control has played an important role in video streaming over networks. Several rate adjustment methods has been developed based on the feedback information such as network state and the output buffer occupancy. We will briefly discuss the state-of-the art methods in the next section.

2

Relevance to the State-of-the-Art

Traditionally, there are two fundamental ways to achieve the rate shaping: requantization of transform coefficient [1] and selective discarding of data [2]. The re-quantization requires partial decompression of already encoded bit-stream. Thus, most methods employ rate shaping by dropping information such as selective discarding of coefficients [3,4], frame dropping [5], or block dropping [6]. Scalable codecs1 (i.e., embedded codecs) greatly facilitate this selective data discarding. Rejaie et al., [7], proposed a rate shaping method by employing MPEG-2 layered-coding profile. The existing rate shaping methods primarily concentrate on down-conversion of MPEG video with respect to Signal-to-Noise-Ratio (SNR) scalability as opposed to considering the full spectrum of scalability options. In particular, we propose to make use of spatial, temporal and SNR scalabilities of video sources. In this paper, we study which option or which particular combination of these three scalability options needs to be employed to maximize the perceived signal quality for a given video sequence. The proposed method is equally applicable to MPEG video as well as embedded video with the following notes: 1. MPEG-Coded Video: It is the most commonly used video coding standard. Although it allows layered coding at the expense of increased complexity and reduced compression efficiency, it is not as flexible as embedded video coders. Therefore, more processing is needed to extract video at different spatio-temporal and SNR resolutions. 2. Embedded Video: An embedded video coder, such as the 3-D subband coder proposed by Taubman et al. [8], inherently provides multi-resolution video at different rates. Therefore, the proposed rate shaping approach with an embedded video is easier to implement.

3

Rate Shaping by Adjusting Spatial, Temporal, and SNR Resolutions

Let α, β, and γ denote the spatial, temporal and SNR resolutions (or scalability levels), respectively. Let a video sequence v coded with the scalability levels 1

Scalability refers to ability to generate a bit-stream that can be reproduced to obtain video at the desired spatio-temporal resolution by parsing appropriate portions of the bit-stream.

788

M. Kim and Y. Altunbasak

(αo , βo , γo ) produces a bit-stream at a rate of Bo . Assuming that the target bitrate is Bt , we can pose the problem as estimating the resolution levels (αt , βt , γt ) that will optimize the re-coded video quality (either in terms of subjective quality or in Peak Signal to Noise Ratio, PSNR). In general, optimal (αt , βt , γt ) is a function of Bo , Bt , (αo , βo , γo ), and the video sequence v itself. That is, (αt , βt , γt ) = M(αo , βo , γo ; Bo ; Bt ; v)

(1)

Although this mapping M may be automatically determined by examining transform coefficients and/or motion vectors, in this paper we will limit ourselves to a supervised classification approach, where the mapping is pre-estimated and stored for various video sequences. Figure 1 depicts the rate shaping module comprised of a bit-stream extraction module and scaling information database. A feedback channel providing information about the network state and the client capabilities is assumed. Our main objective is concentrated on building the scaling information database in Fig. 1. However, rather than estimating this laborintensive multi-dimensional mapping for each individual video sequences, we classify the video sequences into a few classes and estimate a single mapping for each class of video. This is further motivated by our observation that the mappings for the video sequences within the same class are very similar.

Encoded Bitsream : X

Video Type, Compression Level



Extracted Bitsream: X

Video Stream Extractor α, β , γ Scaling Info. Database

Feedback from Network

Fig. 1. Optimum Rate Shaping Module

It should also be noted that the display size and display frame rate are kept the same as determined by the terminal screen size and frame refresh rate in all the scalability options (through temporal frame repetition and spatial bi-linearinterpolation).

4

Simulation Results and Discussion

Two different sets of experiments are carried out in order to demonstrate the efficacy of the proposed rate shaping method. The first sets of experiments use MPEG coded video whereas the video sequences in the second sets of experiments are coded with a 3-D subband coder [8]. This particular subband coder is comprised of 3-D subband coding, progressive quantization, and arithmetic coding providing fine scalability spanning over spatial, temporal, and SNR resolutions.

Optimal Dynamic Rate Shaping for Compressed Video Streaming

4.1

789

MPEG Simulations

In the first sets of experiments, three different video sequences, V 1, V 2, and V 3, with different amount of motion content, are utilized. Each video is originally encoded at Bo = 2 Mbps, and scaled down to four different bit rates. The results are tabulated in Table 1, where subjective quality of the scaled-down video is measured by a star rating system. A four star corresponds to the best quality whereas a single star indicates the worst quality. The ratings are relative among the same target output rate. A group of 8 Ph.D. students are asked to relatively rate the output video sequences with the star rating system. The median rating is then reported in Table 1. The first raws in each sub-table (in Table 1) denote the target output rate, Bt . The first columns in each sub-table indicate the scaling performed in each video. Two spatial resolutions αt = CIF (352x240) and αt = QCIF (176x120); and two temporal resolutions βt = 30 fps, and βt = 15 fps, resulting in 4 different scalability combinations, are taken into account. SNR scaling is automatically adjusted to meet the target bit rate. Thus, 30fps CIF resolution video is implicitly the most coarsely quantized video with lowest value of γt (low SNR resolution) among the same bit rate video streams. Table 1. Quality Report from Scaling Using MPEG V1: Head and Shoulder Video Sequence 200 Kbps 500 Kbps 1 Mbps 1.5 Mbps 30 fps, CIF 30 fps, QCIF 15 fps, CIF 15 fps, QCIF

∗ ∗∗ ∗ ∗ ∗∗ ∗∗∗

∗ ∗∗ ∗ ∗ ∗∗ ∗∗∗

∗∗∗ ∗∗ ∗ ∗ ∗∗ ∗∗

∗ ∗ ∗∗ ∗∗ ∗ ∗ ∗∗ ∗∗

V2: Video Sequence with Moderate Motion 200 Kbps 500 Kbps 1 Mbps 1.5 Mbps 30 fps, CIF 30 fps, QCIF 15 fps, CIF 15 fps, QCIF

∗ ∗∗∗ ∗∗ ∗∗∗

∗∗ ∗∗ ∗∗∗ ∗∗

∗ ∗ ∗∗ ∗∗ ∗∗∗ ∗∗

∗ ∗ ∗∗ ∗∗ ∗∗∗ ∗∗

V3: Video Sequence with High Motion 200 Kbps 500 Kbps 1 Mbps 1.5 Mbps 30 fps, CIF 30 fps, QCIF 15 fps, CIF 15 fps, QCIF

∗ ∗∗ ∗∗ ∗∗∗

∗ ∗∗∗ ∗∗ ∗ ∗ ∗∗

∗∗ ∗∗∗ ∗∗ ∗ ∗ ∗∗

∗ ∗ ∗∗ ∗∗ ∗∗ ∗∗

Relative Rating with ∗ = worst and ∗ ∗ ∗∗ = best

790

M. Kim and Y. Altunbasak

Illustrated in all three sub-tables (in Table 1), the relative rating for CIF resolution video sequences at 30 fps is very poor at low bit rates (Bt = 200Kbps and Bt = 500Kbps). Because no data reduction from neither the spatial resolution nor the temporal resolution is made, video sequences have to be very coarsely quantized to meet the target bit rate. Thus, they fail to produce good quality video at the receiver side. This coarse quantization is also in agreement with the traditional rate shaping methods where only SNR scalability is exploited. It is clearly observed that SNR scalability alone can not yield the best rate shaping. The temporally scaled down video sequence, CIF at 15fps, is evaluated the best in all available target bit rate for the video sequence V 1. In the video sequence with high motion, V 3, the output sequence with a reduction in both temporal and spatial resolution (QCIF at 15fps) is evaluated the best for first three lowest target bit rates. Only when the target bit rate reaches 1.5 Mbps, 30fps CIF resolution video become the highest quality. Compared to the video sequences with distinct characteristics (low motion in V 1 and high motion in V 3), the video sequence with moderate motion, V 2, does not exhibit any unique pattern in its rating. 4.2

Three-Dimensional Subband Coding Simulation

In the second sets of experiments, three video sequences (“head and shoulder” video sequence, the “football” sequence, and the “remote lecture” sequence) are considered. The motion contents of these video sequences are quite different. All three scalability options (e.g., spatial, temporal and SNR scalability) are considered. Three different spatial resolutions corresponding to αt = 352x240, αt = 176x120, and αt = 88x60 are considered. Three temporal resolution corresponding to βt = 30fps, βt = 15fps, and βt = 7.5fps are considered. Finally, six SNR resolution scaling, γ = 0 representing highest SNR resolution though 5 representing lowest quality resolution, are considered. The simulation is performed over the video samples coded with an average bit-rate, Bo , ranging from 500Kbps to 2Mbps. The video quality degradation is measured using the Mean-Square-Error (MSE) metric. Effect of Different Temporal, Spatial and SNR Resolutions. Table 2 compares the video quality with different scaling options for the high motion football sequence originally coded at Bo = 1000 Kbps. The second, third and fourth columns show the spatial, temporal and SNR resolutions, respectively. The resulting MSE is tabulated in the fifth column. The performance data confirms that the different combinations of scalability options (e.g., resolutions) yielding the same target output bit-rate exhibit substantial differences in decoded video quality. Under the same target bit-rate Bt , the decoded video quality with lower temporal frame rate, indicating more temporal scaling, always performs worse (for this video sequence). Due to the fast motion in this video sequence, considerable dissimilarity between consecutive frames exists and temporal interpolation does

Optimal Dynamic Rate Shaping for Compressed Video Streaming

791

Table 2. 3-D subband coding results Bit rate

α

β

0.9 Mbps 176x120 30 fps 352x240 15 fps 0.4 Mbps 176x120 7.5 fps 88x60 15 fps

γ MSE 4 3 3 4

Bit rate

α

β

88x60 30 fps 263 0.5 Mbps 557 352x240 15 fps 1245 0.25 Mbps 88x60 15 fps 735 176x120 7.5 fps

γ MSE 5 4 5 4

328 584 740 1181

Notation: α Spatial resolution, β Temporal resolution, γ SNR resoution (for SNR resolution: 0 = finest, 6 = most coarse)

not improve the decoded video quality. This loss in temporal resolution cause the significant information loss. With fast motion video sequence, temporal resolution scaling should be avoided if good quality video is desired at the receiver end.

reduction in scalability level (%)

Effect of Different Video Classes. Classifying video streams according to their characteristics has a major impact on the video quality when different scalability combinations of (α, β, γ) are employed. Figure 2, 3, and 4 depict the reduction in spatial, temporal and SNR resolutions that provides the best video quality for the “head and shoulder”, “football” and “remote lecture” video sequences, respectively. In all cases, the initial video sequences are encoded at 1Mbps. The horizontal axis measures overall bit rate reduction ratio from the original encoded bit rate ( BBot ), whereas the vertical axis represents reduction ratio from each scalability level. All three curves together express the optimal scalability combination. For example, in Fig. 2, 85% reduction in overall bit rate (x = 85%) obtained by 45% reduction in SNR resolution, 75% reduction in temporal resolution, and no reduction in spatial resolution provides the best video quality for the “head and shoulder” video sequence. 80 70 60 50

spatial temporal SNR

40 30 20 10 0 45

55

65

75

85

95

reduced target bit (%)

Fig. 2. Optimum Scaling for Head and Shoulder Sequence

M. Kim and Y. Altunbasak reduction in scalability level (%)

792

90 80 70 60

spatial temporal SNR

50 40 30 20 10 0 55

60

65

70

75

80

85

90

95

reduced target bit (%)

reduction in scalability level (%)

Fig. 3. Optimum Scaling for Football Sequence

90 80 70 60

spatial

50

temporal

40

SNR

30 20 10 0 72

74

76

78

80

82

84

86

88

reduced target bit (%)

Fig. 4. Optimum Scaling for Remote Lecture Sequence

The “head and shoulder” video sequence has a very low motion content. The major percentage of the bit-rate reduction is provided by temporal scaling, as indicated by the long-dashed curve in Fig. 2. It jumps from 50% to 75% at x = 75%. However, temporal scaling does not account for all the reduction in the bit-rate. In fact, the appropriate target bit-rate is satisfied using the fine grain SNR scalability. It is represented by a short-dashed curve gradually increasing from 0% upto 45% in Fig. 2. The particular 3-D subband coder [8] used in our experiments only allow both spatial and temporal resolutions to be reduced by a factor of two at a time. Once SNR scalability reduction reaches its maximum2 , then the temporal resolution reduction is needed to further cut down the rate. There is no reduction in spatial resolution throughout all output bit-rates. Temporal resolution scaling is favorable in “head and shoulder” video sequence. Since temporal interpolation (though frame repeats) at the receiver produce a reconstructed video comparable to the original video, the decrease in temporal resolution is not critical here. Bit- allocation to higher SNR and spatial resolutions is preferred. In contrast, for “football” sequence in Fig. 3, keeping the highest temporal resolution is recommended until no data reduction can further be achieved with 2

It is only maximum under the given target bit rate. It does not refer to the maximum achievable scaling level.

Optimal Dynamic Rate Shaping for Compressed Video Streaming

793

spatial and SNR scaling alone to meet the target bit-rate. Once the spatial and SNR resolution reduction reaches its maximum (located at x = 68%), only then, the temporal scaling is performed for further bit rate reduction (temporal scaling at x = 75%). At next available target bit rate (x = 80%), temporal reduction level resumes to zero again.

5

Conclusions and Future Research

In this paper, we proposed a novel rate shaping approach applicable to both MPEG and subband coded video streaming. The proposed method considers the full spectrum of scalability options: spatial, temporal, and SNR scalabilities. Thus, it ensures an optimum video quality under various channel conditions. From the results, it is evident that rate shaping with spatial, temporal and SNR scalability options provides significant gains in video quality over the existing approaches where only SNR scalability has been exploited. Furthermore, once the database is built, which is an off-line process, the complexity of our approach is no more than SNR scalability based approaches. The experimental results also show that optimal scalability options for different video classes even under the same initial and target bit rate is quite different. Our current experimentation classifies each video in its entirety observing its content. However, since a single video stream may contain different characteristics during its duration, video classification should be performed at the Group-Of-Pictures (GOP) level. Automatic estimation of the mapping M is also underway.

References

[1] R.J. Safranek, C.R.Kalmanek Jr., and R. Garg, \Methods for matching compressed video to ATM networks," Proceedings of the International Conference on Image Processing, vol. 1, pp. 13{16, October 1995. [2] A. Eleftheriadis and D. Anastassiou, \Constrained and general dynamic rate shaping of compressed digital video," International Conference on Image Processing, vol. 3, pp. 396{399, 1995. [3] N.Celandroni, E. Ferro, F. Potorti, A. Chimienti, and M. Lucenteforte, \DRS compression applied to MPEG-2 video data transmitted over a satellite channel," Proceedings of the Fifth IEEE Symposium on Computers and Communications, pp. 259{266, 2000. [4] S. Jacobs and A. Eleftheriadis, \Streaming video using dyanmic rate shaping and TCP congestion control," Journal of Visual Communication and Image Representation, vol. 9, pp. 211{222, 1998. [5] Z. L. Zhang, S. Nelakuditi, R. Aggarwal, and R. P. Tsang, \EÆcient selective frame discard algorithms for stored video delivery across resource constrained networks," Proceedings of IEEE Infocom, vol. 2, pp. 472{479, March 1999. [6] W. Zeng and Bede Liu, \Rate shaping by block dropping for transmission of MPEG-precoded video over channels of dynamic bandwidth," Proceedings of the fourth ACM International Conference on Multimedia, pp. 385{393, 1996.

794

M. Kim and Y. Altunbasak

[7] R. Rejaie, M. Handley, and D. Estrin, \Quality adaptation for congestion controlled video playback over the Internet," Proceedings of ACM SIGCOMM, pp. 189{200, August 1999. [8] D. Taubman and A. Zakhor, \Multirate 3-D subband coding of video," IEEE Transaction On Image Processing, vol. 1, no. 5, pp. 572{588, September 1994.

IP Stack Emulation over ATM Ir. Geert Goossens and Ir. Marnix Goossens VUB INFO/TW, Pleinlaan 2, 1050 Brussels, Belgium [email protected]

Abstract. This paper describes the ideas behind a new way of running Internet applications on an ATM network. ATM already contains some functionality of the network layer and therefore there is no need to duplicate them in the IP stack. Instead of adapting the TCP/IP stack to ATM at the bottom, we replace the TCP/IP stack with something else that is capable of supporting the QoS needs of applications. The intention is to have Internet applications working over ATM with the same performance as a native ATM application could obtain.

Introduction Internet applications are traditionally only involved in the transfer of non real-time data. These applications do not need anything better than a best effort service from the network. There are no conditions on delay, delay-variation or bandwidth. In the latest years, however, there has been an increasing interest in (mostly high-bandwidth) realtime applications, like multimedia. The industry has therefore been going more and more towards a convergence of the Internet and telecommunications. This requires an enhanced network that is able to support both types of traffic. ATM (Asynchronous Transfer Mode) was developed with this idea in mind. ATM has many features that come from the telecom world (broadband ISDN). It is a connection-oriented protocol, a clear distinction from the connection-less Internet, and it is able to support strict Quality-of-Service (QoS) on each connection. ATM also supports a best effort service. This can be used by traditional Internet applications. ATM therefore would seem to be an ideal choice to support this convergence. The problem with ATM has been that it has been marketed as a fast LAN technology (CLIP [3], LANE 1.0 [1], LANE 2.0 [2], and MPOA [14]), or as a backbone or access technology. In the first case, QoS in CLIP and LANE is almost non-existent. LANE 2.0 does make limited use of QoS. MPOA can make better use of QoS, but is a rather complicated system. In the latter case, some QoS features are used (reserved bandwidth) but not dynamically (administratively configured PVCs) and not end-to-end (not over the entire path from the sending host to the receiving host). In this paper, we present a new method for running Internet applications over ATM. It is the intention to fully support all the available QoS features of the ATM network. ATM contains a number of functions of the network layer. It provides routing, error checking, fragmentation and reassembly of transport-layer packets. Because of this, we want to investigate if it is not possible to eliminate the entire IP layer. Of course, it will not be possible to eliminate IP addresses, because these are P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 795–804, 2001 © Springer-Verlag Berlin Heidelberg 2001

796

I.G. Goossens and I.M. Goossens

used by the applications. We will assume that we have a way to convert an IP address to ATM addresses and we assume for this discussion that this method can work in a global ATM network. We will briefly show a possible method in this paper. Since our solution consists in eliminating the IP stack and replacing it with something else, we call it IP Stack Emulation (IPSE). The applications still work as if there was a normal TCP/IP stack beneath them. In this paper we will look especially at how unicast UDP applications can be made to run over ATM. This paper is organized as follows. In Section 1 we look at the differences and similarities between ATM and IP. In Section 2 we discuss how to map connectionless (UDP) data onto VCs. In Section 3 we see how we want to add QoS support to applications. In Section 4 we look at how we want to use VCs and how we can change the QoS for an application dynamically. In Section 5 we discuss briefly some problems that we encounter when trying to run TCP over ATM. In Section 6 we give a short description of a system that can translate IP addresses to ATM addresses in a large ATM network. Finally, Section 7 concludes the paper.

Comparison between ATM and IP The functionality of ATM overlaps in a number of ways with that of IP [20]. Although ATM is often represented as a layer 2 protocol, it also works as a layer 3 protocol. If we use AAL5 as adaptation layer, it is possible to transport UDP datagrams [18] with the same service as a native UDP implementation. AAL5 can transport packets up to 64K, whereas the maximum payload size for UDP is 65468 byte. From this follows that our header is limited to a maximum of 68 byte. Since this is more than enough for the header, we do not need to provide additional fragmentation or reassembly in IPSE. AAL5 uses a redundancy check to detect errors in the packet (bit errors or lost cells). Hence, we do not need a separate UDP checksum in the packet. Because ATM can do end-to-end routing just like IP, we can setup a connection directly to the destination (or to an edge device if the destination is not connected to the ATM network). In any case, there is no need for routers in this design. We do need a way to translate an IP address into the corresponding ATM address (see later). Since AAL5 cannot do multiplexing like UDP, we have to prepend a header to the payload containing the source and destination port numbers. The IP addresses are fixed for a particular VC, but it can be difficult to signal these at VC setup time (see later). So, we put the source and destination IP addresses in the header as well. This results in a header of 12 byte, which is well below the limit of 68 byte.

Mapping Connection-Less Data over VCs Flows and FlowPaths We want to support Internet applications in the best way possible. For this it is necessary to understand how such applications communicate with TCP/IP. We take

IP Stack Emulation over ATM

797

the popular Berkeley socket interface as starting point. In this API an application first needs to create a socket (an application end-point). This can then be used to send and receive data. We will focus here mainly on UDP applications (connection-less). Datagrams that are sent on the same local socket to the same remote socket constitute a flow. We need to introduce the concept of flows if we want to match applicationlevel packets to VCs. This means that we only need to check once (when the flow is created) what QoS the flow needs and find or setup a VC accordingly. Because a connection-less application does not mark the end of live of a flow explicitly, we delete the flow either when the application destroys its end-point or when the flow has been idle (unused) for a while. Remark that a flow in this definition is the logical representation of the connection between two application end-points. In addition to an application end-point, we also associate the flow with something we call a flowpath. A flowpath groups together all the flows that have the same two hosts as end-points. The flowpath object is created when the first flow is created between a pair of hosts. The flowpath is only destroyed if there have not been any flows on the flowpath for some time. The flowpath will be used to store the common VC that is used for flows that do not need a higher QoS than best effort. Mapping Flows to VCs We make a coarse distinction between two groups of flows: best effort flows and flows with a required QoS. By default, a flow is assumed to be best effort. We will see later how a QoS can be attached to a flow. We also need to take into account that VCs are a scarce resource in an ATM network of a given size. Every VC consumes resources in every ATM switch along the path. Also, the time that it takes to establish a VC through the ATM network is not negligible. It would therefore be best to keep the number of VCs as small as is necessary to provide the required service. For the first category of flows - best effort - it is not necessary to provide a separate VC for each flow between the same two hosts. We create only one VC - called the common or multiplexed VC - to transport all best effort flows. Because all the best effort flows belonging to the same flow path will use this VC, we associate this VC with the flowpath. The common VC is established from the moment that an application sends data over a best effort flow. The common VC is closed only when the flowpath is destroyed or after it has been idle for a preconfigured time, whichever comes first. For the second category, we need to provide a specific QoS. Because we want to use the full capabilities of ATM, we need to setup a separate VC for each flow, called a private or non-multiplexed VC. We establish this VC with the required QoS when the first packet is sent over the associated flow. We tear down the VC when the flow is destroyed or after a preconfigured idle time. In case the VC cannot be established because the network is unable to guarantee the QoS, we may fallback on trying to establish a VC with a lower QoS or simply use the common VC of the associated flowpath.

798

I.G. Goossens and I.M. Goossens

Quality of Service Support We will focus here on the support of applications that provide streaming video and audio. There are two strategies to support this class of applications. Either we change the applications to work around the limitations of a best effort service (as far as this is possible) or we let the network provide QoS to the applications. Obviously, we are interested in doing the latter. This allows users to view a video stream at a constant quality. If it is the intention to provide the same experience as with the current television system (the idea of convergence), then this is the approach that we will have to follow. This means that there must exist a way to associate a QoS with a flow. We distinguish three methods. The most obvious way is to modify the application to provide information about the QoS that it requires. Of course, the application is the best authority in knowing what is required for the particular data that it transports. Additions to the socket interface (like Winsock 2.0 [4]) make this possible. It is not practical or even possible to modify all applications in this way. Therefore, we provide a way for the administrator of the host to specify a number of rules. These rules associate the flow parameters - source and destination IP address, source and destination UDP (or TCP) port - with specific QoS parameters. The flow parameters can also be wildcards. So, it is possible to say that all flows with destination port 5000 have to use a VC with a specific QoS. In addition it is also possible to restrict a rule to a specific application. When a flow is created, IPSE checks if the flow falls under one of these rules. If it does, a private VC will be created for this flow. However, in some cases it still is difficult to know what QoS an application will need. A user can select different codecs or set different quality parameters for a codec, each having its own QoS requirements. Also, it is not always possible to know what ports an application will use. To overcome these problems, we provide a tool that visualizes the flows. The user can use this tool to look at the flows that each application has created and he can inspect the statistics of the flow (number of bytes sent/received, idle time, …). In addition the user can change the QoS dynamically, without stopping or interrupting the application. In this way, each flow will normally start off as best effort. When the user notices that the quality is less than what he would expect, then he can set a higher QoS. Instead of filling out all the QoS parameters, the user can also use QoS templates. This simplifies the task for the user of figuring out what type of stream (MPEG, H.261, …) needs what kind of QoS. It also allows the user to rapidly change a QoS. The user can specify the QoS in the way described in [6], or he can specify the ATM service [7] (UBR, ABR, nrt-VBR, rtVBR or CBR) directly and give appropriate values for the parameters of the service. In the first case, a translation must be done to the corresponding ATM values. RFC 2381 [8] describes how to do this for a guaranteed and controlled-load service. How it is done exactly may depend on administrative settings and on what services are available. For end users it is probably better to specify the QoS in this general way, rather than working with ATM concepts. One of these methods sets the 'ideal' QoS that the flow should have. It will not always be possible for the ATM network to deliver this, of course.

IP Stack Emulation over ATM

799

Using VCs Establishing VCs In ATM every VC needs to connect to a SAP (Service Access Point) on the remote host. We create a SAP per IP address on each host. This is the SAP that common VCs connect to. For every application end-point (socket), we also create a SAP. This is the SAP that a private VC must connect to. The name of the SAP can be derived from the UDP port number. The Broadband High Layer Information (BHLI) element of the UNI specification [15] [16] is used for this purpose. This element must be present in the connection setup and it must be set as follows. The High Layer Information Type is set to 1 (User Specific) and the High Layer Info field is set to an 8 character identifier, starting with 'UDPE' followed by the hexadecimal ASCII representation of the port number. This has the advantage that the call is cleared immediately if the destination end-point does not exist. If the VC had a QoS, the reserved bandwidth will become again available to the network as fast as possible. A problem poses itself for the remote host when it accepts a VC. Since neither the IP address nor the UDP port is contained in the signaling message, the remote host does not know what flow or flowpath this VC is for. Since this information is fixed per VC, we would ideally like to put this information in the initial signaling messages. RFC 3033 [5] addresses this issue. However, it does not always seem possible to do so, since this depends on the configuration of the ATM switches along the path. Probably not all switches even have the possibility to allow these information elements in the signaling messages. Therefore, we give this information in the header of each packet. This means that the peer's IP address and/or UDP port is only known when the first packet has been successfully received over the VC. We will see later that this presents a problem when we want to change the QoS dynamically. Another problem that we may face is that both hosts establish a VC to each other for the same flow or flowpath at approximately the same moment. This can be easily detected as soon as packets are being received over both VCs. Because VCs take up resources in the network, we would like to get rid of the superfluous VC. If the QoS for the associated flow has been negotiated (see later) then we take the VC that has a QoS that is closest to the negotiated QoS. Otherwise, we take the VC with the largest QoS. If both VCs have equal QoS, the host with the largest ATM address will start using the VC of the other host as soon as contention is detected. It will then close its own VC. The other host simply continues to use its own VC. It will, of course, continue to accept packets on the other VC until this one is closed. Sending Data In a connection-less service the application provides the destination address for each send operation. Normally we would have to check for each packet being sent what QoS to use and to search for the matching VC. Instead, we look in the list of flows that start from that application end-point. If the flow does not yet exist, we create a new flow descriptor and find out which VC it must use and establish the VC with the

800

I.G. Goossens and I.M. Goossens

correct QoS if necessary. Once we have the flow information, we can direct the packet immediately over the correct VC. Receiving Data A VC either has a flowpath or a flow associated with it. In the first case, when we receive data on such a VC, we look in the list of flows that belong to the flowpath. In the second case, we have the flow immediately. Every flow is associated with an application end-point, so we can deliver the packet to the application immediately. If the VC is not yet associated with any flow or flowpath, we must lookup and if necessary create these objects. Here it is possible that we find out that the flow or flowpath is already assigned to another VC. In that case, one of them will be dropped according to the rules described above. Changing the QoS It is possible that the QoS requirements of a flow change during the lifetime of a flow, either because the application wants a different QoS or because of a user action. At any time one of the two hosts can start a procedure to negotiate new QoS parameters. The messages are sent as control packets (all header fields set to zero). They contain the flow specification (IP addresses, port numbers) and the desired QoS for both directions. These messages can be exchanged over the existing VC between the two applications or over the common VC between the two hosts (if this VC exists). If negotiation was successful, the host that started the negotiation establishes a new VC with the negotiated QoS. Now, there are two possibilities. Either the network supports including extra information elements in the SETUP message. In that case, the receiving host knows the flow for which this VC is intended at the same time as the VC is established. In case it is not possible to signal this information at VC establishment time, we have a problem. The problem occurs when the host that established the connection does not have anything to send or if the message that he did send was lost. Because we provide an unreliable service (like UDP) there is no guarantee that a message will arrive. To solve this problem, the accepting host starts a VC Identification Protocol. The receiving host does this if it does not know by any other means what flow the VC represents. The receiving host sends a control message over the VC (all header fields set to zero) announcing its own flow parameters (IP address and destination port). The peer must respond with its flow parameters. When the first host sees the response, it knows what flow has to be connected to the new VC and the old one can be dropped. The host must retry transmission of the VC Identification Packet when it does not get a response in time. When the host receives a normal packet that identifies the flow completely, it may stop the identification protocol.

IP Stack Emulation over ATM

801

TCP Emulation We talked mainly about UDP. Instead of the TCP protocol [19], we can use any other protocol as long as it provides the same service to the application as TCP does. At the moment, however, we use a normal implementation of the TCP protocol and run it over ATM in a similar way as UDP. However, we do not need to introduce a flow concept here, since TCP already is a connection-oriented protocol. When the application opens a TCP connection, we figure out if a QoS needs to be used or not and we establish a VC if necessary. If the application sends data, we forward it immediately to the correct VC, because this VC is associated with the TCP connection. If the application closes the TCP connection and it used a private VC, then the private VC is closed immediately. The connection-oriented TCP protocol now runs directly over the connection-oriented ATM protocol. There is no connection-less IP layer between them as in CLIP [3]. To improve TCP performance over ATM, it is advantageous to set a large MTU (Maximum Transmit Unit) to decrease the header overhead and the overhead involved in processing packets. We could easily set the MTU to 16K or more. This has a side effect on the Nagle algorithm [17]. This algorithm prevents TCP from sending any more packets if a maximum size packet has been sent, but has not been acknowledged yet. This is to prevent TCP from sending a lot of small packets on the network. If the MTU is large, then it's possible that the application is unable to provide the full MTU to TCP. This would downgrade performance, since transmission would be halted until the ACK is received. To solve this, we set a lower watermark (let's say 4K) that we use for the Nagle algorithm instead of the real MTU. From the moment that there is this much data available, TCP is allowed to send a packet. A large MTU also influences congestion control [21], since the congestion window typically opens with one MTU per acknowledgement (during slow start). For large MTU's this could open the window very fast. This can cause congestion in the network because all packets (and cells) are sent in burst. Even with smaller MTU's TCP can exhibit a bursty behavior, which causes a lot of cells to arrive all at once in an ATM switch. If the switch lacks sufficient buffer capacity at that moment to store all these cells, cells and, consequently packets, will be dropped. It should be possible in ATM to pace the TCP stream [11] [12] at the cell level, so that the buffer utilization of ATM switches is minimized. In that case, the ATM card receives instructions from TCP at which cell rate a packet must be transmitted on the network. Other improvements can make use of the fact that all packets are automatically delivered in order over an ATM VC. This allows the receiver to quickly detect a lost packet in a stream and to request retransmission [13].

Address Resolution Since Internet applications only work with IP addresses, we need to have a way to convert an IP address into the corresponding ATM address. The ATMARP system used in CLIP [3] is inadequate because of scaling problems in large networks. Potentially the number of hosts in our network could be very high, since the ATM cloud is not divided into subnets by routers. We want a solution that scales and that is

802

I.G. Goossens and I.M. Goossens

stable with respect to changes in the network topology. We will present here a short overview of a proposed solution. A complete description of the system will be presented later in a separate paper. Small Networks For compatibility reasons we want to keep the ATMARP protocol described in [3], since such a server is often conveniently implemented in a switch. This would require no extra server if the system were used in a small network. Medium-Sized Networks To provide scalability we create a DNS-like hierarchy, comparable with the inaddr.arpa domain [9]. This domain is used to translate an IP address into the corresponding host name. Here, we will create a similar domain to translate an IP address into the ATM address of the same machine. The IP address is subdivided in four bytes, which in reverse order each represent a subdomain. So, the highest level server could be responsible for the 134 domain, the next level server handles the 184.134 domain, the last one the 50.184.134 domain. The ATMARP servers are configured with the ATM address(es) of one or more DNS servers. When an ATMARP server has a host that belongs to a certain domain as specified above, it finds and contacts the DNS server that is responsible for this domain. It uses dynamic updating to modify the contents of the DNS server [10]. For relatively small networks we can use a caching timeout of 15 to 20 minutes, similar to the timeout in ATMARP. For the implementation on the hosts nothing changes. They continue to communicate with ATMARP servers using the classical ATMARP protocol. Problem in Large Networks In a global ATM network, the small caching time of 15 minutes could present problems. In a normal DNS system cache timeouts are in the order of days. We would therefore prefer to cache addresses for longer times. It should be noted that the binding between an ATM and an IP address is not so stable as between an IP address and a domain name. Indeed, simply changing a host from one ATM switch to another (or even to a different port on the same switch) makes it difficult to keep the ATM address the same. We need a more stable solution. Virtual ATM Addresses We divide the ATM cloud into smaller networks. We assume that each network is managed separately and interconnected in a well-defined way (like networks on the current Internet). We give each network an identification number. This number is completely arbitrary, but must be unique in the entire network. Each one of our DNS servers is configured with the number of the network that it belongs to. In addition to the real ATM address, a fixed virtual ATM address is associated with every IP host.

IP Stack Emulation over ATM

803

This ATM address consists of a network dependent part and a part (host identifier) that contains the IP address. In the DNS-like requests we provide a way to specify the network identifier of the requestor. If the field of the requestor matches up with the authoritative server's network identifier, the real ATM address is returned. Otherwise, the requestor receives the virtual ATM address. For this virtual address the cache time may be set very large. Border Switches We still need to guarantee that any host from outside the destination network can successfully connect to a virtual ATM address inside the network. Let's take two networks with different identifiers. We assume that these networks are connected to each other by a special kind of switch that we will call the border switch. The first part of the virtual ATM address refers to this border switch. In this manner, the connection setup is routed to this switch. The last part of the virtual ATM address contains the IP address of the host. Because the switch is part of the destination network, it can retrieve the real ATM address via this IP address. The switch can now proxy the signaling protocol to the real destination so that a VC is established between the two end hosts. The border switch then behaves like a normal switch for this VC. Alternatively, instead of a switch a gateway can be deployed that terminates the first VC and starts a new VC to the destination. The gateway then functions as a packet-level router, which can also be configured as a firewall.

Conclusion We have presented here a method for running Internet applications over ATM by replacing the TCP/IP stack with something that takes the special features of ATM into account by design. The system is very radical in the sense that it tries to eliminate as much as possible from the TCP/IP stack and replace it directly with native ATM functionality. Applications that use QoS are supported. In addition the user can also indicate what QoS to use for a particular flow in case the application is not QoSaware. More work still needs to be done on adding better support for TCP, multicast UDP and QoS. Also in the future support for IPv6 will need to be added. Because we do not have packet compatibility with normal IP packets, we do have a problem when we want to connect this system to the rest of the Internet. This problem will need to be addressed as well.

804

I.G. Goossens and I.M. Goossens

References 1. ATM Forum Technical Committee: LAN Emulation Over ATM Version 1.0, January 1995, ftp://ftp.atmforum.com/pub/approved-specs/af-lane-0021.000.pdf 2. ATM Forum Technical Committee: LAN Emulation Over ATM Version 2 - LUNI Specification, July 1997, ftp://ftp.atmforum.com/pub/approved-specs/af-lane0084.000.pdf 3. M. Laubach, J. Halpern: RFC 2225 Classical IP and ARP over ATM, April 1998 4. M. Hall e.a.: Windows Sockets 2 Application Programming Interface, May 1996, http://www.stardust.com/winsock 5. M. Suzuki: RFC 3033 The Assignment of the Information Field and Protocol Identifier in the Q.2941 Generic Identifier and Q.2957 User-to-user Signaling for the Internet Protocol, January 2001 6. C. Partridge: RFC 1363 A Proposed Flow Specification, September 1992 7. The ATM Forum Technical Committee: Traffic Management Specification Version 4.0, April 1996, ftp://ftp.atmforum.com/pub/approved-specs/af-tm-0056.000.pdf 8. M. Garrett, M. Borden: RFC 2381 Interoperation of Controlled-Load Service and Guaranteed Service with ATM, August 1998 9. P. Mockapetris, RFC 1034 Domain Names - Concepts and Facilities, November 1987 10. P. Vixie, RFC 2136 Dynamic Updates in the Domain Name System (DNS UPDATE), April 1997 11. J. Kulik, R. Coulter, D. Rockwell, C. Partridge: Paced TCP for High Delay-Bandwidth Networks, Proceedings of IEEE Globecom, December 1999 12. A. Aggarwal, S. Savage, T. Anderson: Understanding the Performance of TCP Pacing, Proceedings of IEEE Infocom, March 2000 13. F. Ansari: Adapting TCP/IP over ATM, Master of Science Thesis, University of Kansas, 1996 14. The ATM Forum Technical Committee: Multi-Protocol over ATM Version 1.1, May 1999, ftp://ftp.atmforum.com/pub/approved-specs/af-mpoa-0114.000.pdf 15. The ATM Forum Technical Committee: ATM User-Network Interface (UNI) Signalling Specification Version 4.0, July 1996, ftp://ftp.atmforum.com/pub/approved-specs/af-sig0061.000.pdf 16. The ATM Forum Technical Committee: ATM User-Network Interface Specification Version 3.1, September 1994 17. J. Nagle: RFC 896 Congestion Control in IP/TCP internetworks, January 1984 18. J. Postel: RFC 768 User Datagram Protocol, August 1980 19. J. Postel: RFC 793 Transmission Control Protocol, September 1981 20. J. Postel: RFC 791 Internet Protocol, September 1981 21. M. Allman, V. Paxson, W. Stevens: RFC 2581 TCP Congestion Control, April 1999

ATM Network Restoration Using a Multiple Backup VPs Based Self-Healing Protocol S.N. Ashraf1 and C. Lac2 1 Institut national des télécommunications 9, rue Charles Fourier, 91011 Evry Cedex, France Tel: +33 1 60 76 47 29, Fax: +33 1 60 76 42 91 [email protected] 2 France Télécom R&D, RTA/ECD 2, avenue Pierre Marzin, 22307 Lannion Cedex, France Tel: +33 2 96 05 27 36, Fax: +33 2 96 05 34 27 [email protected]

Abstract: Physical route assignment and capacity allocation functions of a Virtual Path (VP) are decoupled in Asynchronous Transfer Mode (ATM) networks. This means a zero-bandwidth VP can be preconfigured as backup of a working VP. This feature makes self-healing ATM networks particularly interesting as faster and efficient restoration can be realized by capturing the necessary bandwidth on the backup VP after a failure. With an aim to further increase the restoration speed, we developed a new Multiple Backup VPs (MBV) based protocol that permits one or more backup VPs to protect a single working VP. This approach helps holding the spread of restoration information in reduced span leading to faster recovery. The multiple backup VPs can be setup either in overlapped or non-overlapped way. This paper describes the operation of the protocol and studies how it recovers from unidirectional and bidirectional single link failures using both non-overlapped and overlapped scenarios. Performances are evaluated in terms of restoration ratio for a meshed-topology.

1 Introduction Asynchronous Transfer Mode (ATM) is the switching and multiplexing method adopted for implementing Broadband Integrated Services Digital Networks (BISDN). An infrastructure based upon fiber optics and high speed digital electronics allows ATM to reach high transfer rates. However, use of fiber optics implies more traffic being concentrated on fewer routes, any transmission link/system failure tends to cause extremely serious problems due to huge loss of bandwidth, loss of service to user and loss of revenue to the operating companies. Therefore, in B-ISDN networks, demands for network reliability have highly increased. In this context, restoration techniques that minimize damage by automatically rerouting the traffic away from the failure point play a key role in network reliability enhancement.

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 805–814, 2001 © Springer-Verlag Berlin Heidelberg 2001

806

S.N. Ashraf and C. Lac

Originally proposed by Grover in 1987 [1], self-healing is a distributed control restoration scheme for networks with no topological restriction. Since 1992, Virtual Path (VP) layer based self-healing networks have been studied, and many schemes using ATM’s characteristics have been proposed [2, 3]. VP restoration has several fundamental advantages made possible by the VP path layer concept of ATM network as standardized in [4]. VP restoration realizes simple and resource-efficient restoration architecture. One of the most striking characteristics is the ability to preestablish backup paths using zero bandwidth VPs. Another advantage useful for selfhealing is the OAM (Operation, Administration and Maintenance) cell mechanism possible with VPs. End-to-end (ETE) backup VP based self-healing protocol is the most widely studied VP layer based protocol till recently [5]. In this restoration scheme, the main VP and corresponding backup VP are established between source-destination on link/node-disjoint routes to avoid simultaneous failures in both VPs. However, such use of backup VPs is not efficient from restoration speed’s viewpoint in huge networks, as the restoration messages have to pass through all nodes on the failed and backup VP between the source and destination. In this context, we developed a protocol called Multiple Backup VPs (MBV) based self-healing protocol that allows a working VP to be split into one or more sections depending upon the length. A smaller VP that can be restored faster protects each part as presented in the following sections. This article studies operation of the MBV protocol for unidirectional and bidirectional single link failure scenarios and evaluates its performances from restoration speed viewpoint. Article is organized as follows. In section II, basic principle MBV self-healing protocol is presented. Restoration operation of the protocol for single link failure scenario is described in sections III and IV. Results are presented in section V, followed by the conclusion in section VI.

2 MBV Protocol Services carried by an ATM transport network can be restored by using an ETE backup VP [5]. Initially, the netETE Backup VP work searches for several paths between source-destination pair. 1 2 3 4 5 6 7 8 9 The best such path is designated as main VP, and the second best path Fig.1. End-to-End Protocol is reserved as ETE backup path as VP(a) VP(b) depicted in Fig.1. VPI numbers and the required amount of bandwidth are assigned to the main VP. For 1 2 3 4 5 6 7 8 9 Section 1 Section 2 efficient use of network resources, no bandwidth but only VPI numFig.1. Multiple Backup VPs Protecting a main VP bers are assigned to the ETE

ATM Restoration Using a Multiple Backup VPs Based Self-Healing Protocol

807

backup VP. In case of a failure, next downstream node of the failure detects the fault. The failure is recovered by shifting transmission from the main VP to the preplanned alternative backup VP after proper bandwidth has been assigned to it. Since ETE backup VP is established between source-destination on link/node disjoint paths, for longer VPs failure notifications and subsequent bandwidth capturing on the backup VP may take considerable time. However, if the restoration process can be localized, then the network can act and respond faster to failures and recover more rapidly than it is possible with ETE protocol. In MBV protocol, the main path is divided into one or more restoration sections. For instance, in Fig.2, the normal VP of example shown in Fig.1 is split into two sections. Each section is protected by one backup VP. Depending upon the way backup VPs are organized, the protocol can be divided into two following types: A. B.

Non-overlapped backup VPs, Overlapped backup VPs.

A. NON-OVERLAPPED BACKUP VPs This case is shown in Fig.2 where two sequential sections have the same node as terminal node. Such a node is not protected by any of the backup VPs and therefore, its failure will be unrecoverable. Let us suppose that the bidirectional link 3-4 fails. Then restoration procedure can then be described by following phases: •

Phase 1: Failure Detection OAM continuity check cells as described in ITU-T I.610 standard are used for failure detection. In case of supposed failure, nodes 3 and 4 detect the failure, thereby starting the restoration from both sides. • Phase 2: Fault Notification As soon as an intermediate node detects a fault, OAM Alarm Indication Signal (AIS) cells are generated and transmitted periodically towards end node through all active VPs that pass through the failed link or node. All the intermediate nodes can nonintrusively monitor these cells and declare VP AIS-State. Therefore, nodes along the failed VP can know about the failure. Node 3 sends the AIS message towards node 1 for notification whereas node 4 sends a similar message to node 9. •

Phase 3: Bandwidth Capture on Backup VP On declaration of VP AIS-State, end nodes of the section send restoration messages from the respective side on the backup VP a protecting the section. Normally, bandwidth is captured step-by-step on the intermediate nodes in a way similar to the call-setup process shown in Fig. 6. However, in case of backup VPs with zero bandwidth assigned, due to the fact that the routing tables are preconfigured, a quasiparallel way of bandwidth capturing as shown in Fig. 7 is proposed. In quasi-parallel way; the node of the failed VP connected to the backup VP sends in sequence two messages towards next node of backup VP as follows:

808

S.N. Ashraf and C. Lac

Bandwidth Capture Message: Each node on backup VP keeps a copy of the message and then simply switches it forward to the next node until it reaches the destination. This message helps intermediate nodes to know about the failure as well as the bandwidth to be captured. Backup VP Time

Bandwidth Capture Message

Capture Bandwidth

Fig.3. Step-by-Step Bandwidth Capture on Backup VP Backup VP Time

Bandwidth Capture Message

Capture Bandwidth

Bandwidth Capture Confirmation Message

Fig. 4. Quasi-Parallel way of Bandwidth Capture on Backup VP

Bandwidth Capture Confirmation Message: This is a step-by-step confirmation message and is forwarded to the next node if required bandwidth is available. Phase 4: Restoration Messages Collision Arrival of a bandwidth capture message will cause collision at a node that have already captured the bandwidth due to a similar message received earlier from other side of the backup VP. Upon collision, the node transmits bandwidth capture acknowledgement towards both end nodes of the Collisions Acknowledgement section, i.e., nodes 1 and 5. Multiple collisions may occur in two adjaTime cent nodes as it is quite unlikely that bandwidth ?t capture message arrive simultaneously at a node. Multiple collisions Bandwidth Capture result multiple acknowlAcknowledgement Message edgements as shown in Fig.5. Multiple Collisions of Bandwidth Capture Messages on the Fig.5. Backup VP • Phase 5: Switching to Backup VP

ATM Restoration Using a Multiple Backup VPs Based Self-Healing Protocol

809

On reception of the acknowledgement, nodes 1 and 5 switch the traffic from the failed VP to the backup VP, thereby completing failure restoration for this VP. The scheme can recover from all type of failures, either unidirectional or bidirectional of intermediate links or nodes on the main VP, except the node where adjacent backup VPs terminate (i.e., node 5). This shortcoming can be avoided by overlapping the backup VPs as explained in the following part. B. OVERLAPPED BACKUP VPs As adjacent backup VPs terminate on the same node, this single node failure can not be recovered by protecting the normal path with multiple backup VPs in nonoverlapped way. In overlapped case, however, no single node affect more than one backup VPs; therefore, this scheme can recover from all type of failures of intermediate links/nodes of main path. Overlap of sections may consist of two or more nodes. Fig.6 depicts a main VP consisting of nine nodes protected by two overlapped backup VPs. Section 1 extends from node 1 to node 6, whereas section 2 extends from node 4 to node 9. In case of node 4’s failure, backup VP a is used for the recovery and likewise node 6’s failure can be recovered by backup VP b. Overlapping of backup VPs makes the protocol relatively complex as compared to the non-overlapped case. From complexity’s viewpoint, the possible failure scenarios can be divided into two following groups: a. Non-overlapped zone failures, b. Overlapped zone failures. Any failure in the non-overlapped zone is restored almost in similar fashion as in case of non-overlapped backup VPs and can be considered as a simple failure compared to the overlapped zone since there is always one backup VP to recover the failure. However, in the overlapped zone, each network element is protected by more than one VP. Therefore, a failure in this zone (e.g., node 5’s failure) may start the restoration procedure independently from more than one backup VPs leading to a possibility of conflicts. To resolve such a conflict overlapped zone is put under the responsibility of one of the two backup VPs as shown VP(b) VP(a) in Fig. 4. In this way, section 1 becomes 1–2–3–4–5–6 and sec1 2 3 4 5 6 7 8 9 tion 2 becomes 6–7–8–9. This means that VP b does not have Section 1 Section 2 the same end nodes as those of Fig.6. Overlapped Multiple Backup VPs Protecting the the corresponding section 2. VP a Main VP will recover the failures detected by any node on section 1 of main VP(b) VP(a) VP and, likewise, VP b will do the same for section 2. Node 6 is a part of section 1 when the fail1 2 3 4 5 6 7 8 9 ure is on upstream side and of Section 1 Section 2 section 2 if the failure is on downstream side of the main VP. Fig.7. Overlapped Multiple Backup VPs With NonOverlapped Sections

810

S.N. Ashraf and C. Lac Main and Backup VPs are Setup. Enter Failure Watch Phase

Failure Occurred?

Send VP-AIS to the Next Downstream Node

No

Yes Failure Detected

No Is Next Node Last in the Restoration Section? Yes

No

Detecting Node is End Node of the Section? Yes

No

Is Failure Detected In the Corresponding Backup VP?

Yes

Node is End Node of the Relevant Backup VP No

Yes

Send VP-AIS to the Next Downstream Node

Send BWCM and BWCC to Next Node on B-VP and Switch from Main VP to Backup VP

Unrecoverable Failure

No Yes

If Message is BWCM?

End Node of B-VP?

Yes

No

Required BW Available/Captured ? Yes Capture Bandwidth and Forward BWCC to next node

No Destroy BWCM Collision Detected?

End Node of B-VP?

No

Yes

No

Yes Restart User Data Transmission

Send BWCM to Next Node on B-VP

BWCM : Bandwidth Capture Message BWCC : Bandwidth Capture Confirmation Message

Fig.8. Flow Diagram for Restoration using MBV Protocol

Flow diagram of the restoration procedure using MBV protocol employing quasiparallel bandwidth capturing method is shown in Fig.8.

3 Unidirectional Link Failure Fig.9 illustrates how the network performs restoration from unidirectional single link (between nodes 3 and 4) failure. Fault-detecting node 4 generates and forwards AIS cells towards the end node 9. All the intermediate nodes 5, 6, 7 and 8 copy and then forward theses AIS cells. When the end node 9 receives AIS message about the failure, it sends a RDI message towards the upstream end node 1 through main VP so that the nodes upstream to the failure may know about the failure as well. Node 1 on

ATM Restoration Using a Multiple Backup VPs Based Self-Healing Protocol

811

arrival of such a message declares RDI-State and stops AIS sending data until the arrival of a proper restoration message from other side via 1 2 3 4 5 6 7 8 9 backup VP a. Node 5 on reading about the fault location Fig. 9. Restoration from Unidirectional single Link Failure Using Two Backup VPs from the AIS message takes up responsibility to perform Collision BW Capture Message restoration. Node 5 sends Acknowledgement AIS restoration messages towards node 1 via backup VP to capture the bandwidth for carrying the affected traffic. Node 1 2 3 4 5 6 7 8 9 1, on receiving the restoration Fig. 10. Restoration from Bi-directional single Link Failure message, switches from RDI to normal-state and starts sending data towards node 9 through new route. When data cells reach at the node 9, it switches from AIS to normal state as well. This completes the restoration. User Data

BW Capture Message

4 Bidirectional Link Failure In case of bidirectional failure node 3 and 4 detect the failure, thereby starting the restoration from both sides as depicted in the Fig.10. AIS message are sent towards respective end nodes for notification. Nodes 1 and 5 (which are in fact section’s end nodes where failure has occurred) send restoration messages to the backup VP to capture the necessary bandwidth. Upon detection of the collision, acknowledgement messages are sent via section end nodes towards the VP end nodes to indicate successful bandwidth reservation on the backup VP so that data transmission can be resumed.

Fig. 11. Sample Network

Item

Value

Propagation Delay

0.25 msec/link

Failure Detection

20 msec

VP-AIS Processing

1 msec/node

VP-RDI Processing

1 msec/node

Bandwidth Capture

10 msec/node

Traffic Redirection

10 msec

Tab.1. Evaluation Parameters

812

S.N. Ashraf and C. Lac

Restoration Ratio

5 Restoration Ratio

Restoration Ratio

Restoration Ratio

Restoration Ratio

To quantify the performances of MBV protocol speed of restoraOverlapped tion is used as criterion. Results Non-Overlapped show restoration ratio (capacity of restored VPs to capacity of Time Elapsed (sec) failed VPs) as a function of time Fig.12. Comparison of Restoration Ratio Between ETE elapsed after failure. The restoand MBV Protocols for Unidirectional Link Failure ration ratio results from all possible simulation cases of single link failure restored by ETE ETE/MBV protocol for meshed MBV (10 Hops) topology shown in Fig.11 and MBV (9 Hops) MBV (5 Hops) using the parameters of Tab 1. MBV (4 Hops) Unidirectional single link failure: Fig.12 shows gain in restoration speed compared to the Time Elapsed (sec) ETE protocol. Here it is supFig.13. Restoration Ratio where VPs Longer than Certain posed that a VP longer than 6 Hop Length are Split into Two Sections hops is split into two sections. Fig.13 shows the effect on restoration ratio of variation in hop-length limit beyond which Step-by-Step the VP is split into two sections. The results shown in Fig.12 and Quasi-Parallel Fig.13 are observed while employing step-by-step bandwidth capturing approach on the Time Elapsed (sec) backup VP. The gain in speed Fig.14. Restoration Ratio While Employing Step-by-Step and by using quasi-parallel bandQuasi-Parallel Bandwidth Capture Method with ETE Protocol width capturing approach is shown in Fig.14 for ETE protocol where as a comparison between ETE and MBV protocols is shown in Fig.15. Bidirectional single link failure: As explained earlier bidirectional link failure is restored by ETE restoration procedure triggered from both sides of the failed link MBV and is likely to be restored faster as compared to the unidirectional link failure. Results simiTime Elapsed (sec) lar to those for unidirectional Fig.15. Comparison of ETE and MBV Protocols While link failure are presented for Employing Quasi-Parallel Bandwidth Capture Method bidirectional link failure scenario ETE

Restoration Ratio

ATM Restoration Using a Multiple Backup VPs Based Self-Healing Protocol

813

ETE Overlapped

Non-Overlapped

Time Elapsed (sec)

Fig.16. ETE vs. MBV Protocols for Restoration from a Bidirectional Link Failure

Restoration Ratio

ETE MBV (10 Hops) MBV (9 Hops) MBV (5 Hops) MBV (4 Hops)

Time Elapsed (sec)

Restoration Ratio

Fig.17. VPs Longer than Certain Hop Length are Split into Two Sections for Bidirectional Link Failure Scenario

ETE MBV

Time Elapsed (sec)

Fig.18. ETE vs. MBV Protocols While Employing Quasi-Parallel Bandwidth Capture Method

in self-explanatory Fig.16, Fig.17 and Fig.18. Hop-length limit for VP splitting is 9 for the results shown in Fig.16.

6 Conclusions We have presented operation of a new self-healing protocol for ATM networks called multiple backup VPs based (MBV) protocol. This protocol is optimized for the restoration speed from a failure. Faster restoration is achieved by splitting the longer VPs into more than one section, thereby, keeping the restoration operation in reduced span around the failed element. The protocol can recover from all single link/node failures.

814

S.N. Ashraf and C. Lac

In order to study the protocol, we have selected a sample meshed topology shown in Fig.11. Restoration ratio is calculated for unidirectional and bidirectional single link failure scenarios. The results show that the MBV protocol can recover 15-30% faster from the assumed link failure scenarios as compared to the ETE protocol. Moreover restoration speed can be further improved up to 40% under supposed topology and parameters if proposed quasi-parallel bandwidth capturing approach is used on the backup VPs.

7 References 1. W.D. Grover, “The Self-Healing Network: A Fast Distributed Restoration Technique for Networks Using Digital Cross-Connect Machines”, Proc. of GLOBECOM’87, Tokyo, Japan, November 1987, pp. 1090–1095. 2. R. Kawamura, K.I. Sato and I. Tokizawa, “Self-Healing ATM Networks Based on Virtual Path Concept”, IEEE Journal on Selected Areas in Telecommunications, Vol. 12, N° 1, 1994, pp. 120-127. 3. R. Kawamura and I. Tokizawa, “Self-Healing Virtual Path Architecture in ATM Networks”, IEEE Commun. Mag., September 1995, pp. 72-79. 4. ITU-T Recommendation I.610, “B-ISDN Operation and Maintenance Principles and Functions”, 1995. 5. R. Kawamura, “Architectures for ATM Network Survivability”, IEEE Communications Surveys, http://www.comsoc.org/pubs/surveys, 1998.

A New Consolidation Algorithm for Point-to-Multipoint ABR Service in ATM Networks Md. Shamsuzzaman, Anil K. Gupta, and Bu-Sung Lee School of Computer Engineering, Nanyang Technological University Nanyang Avenue, Singapore 639798

Abstract. In ATM networks, ‘feedback implosion’ may occur at the source of a point-to-multipoint Available Bit Rate (ABR) service if the Backward Resource Management (BRM) cells are not consolidated at the branch-points. Existing consolidation algorithms do not consider information contents of a BRM cell to decide whether the cell should be passed to the upstream node or not, and they suffer from various undesirable effects, such as consolidation noise, slow transient response etc. In this paper, first we clearly identify the responsibilities of a branch-point of a point-to-multipoint ATM ABR connection, and then we propose a new consolidation algorithm where a BRM cell is passed to the upstream node immediately if it contains ‘critical information’, otherwise, it is discarded. We investigate the performance of our algorithm using simulation, and the results show that our proposed algorithm provides faster and more accurate feedback with excellent scalability, in comparison to the existing waitfor-all algorithm.

1 Introduction The point-to-multipoint (p-mp) ABR service in ATM networks is considered important for many emerging applications. In a p-mp connection, data cells and forward resource management (FRM) cells are generated at the source, and they are replicated at the branch-points to travel downstream along the multicast tree. In the backward direction, no data cell is allowed but the backward resource management (BRM) cells travel towards the source to notify the network condition, so that, the ABR source can adapt its cell rate accordingly. As per the ATM Forum recommendation [1], consolidation of the BRM cells should be carried out at the branch-points to avoid ‘feedback implosion’ or overwhelming the sender with feedback. However, in the consolidation process, information may be lost and/or delayed at the branch-points causing consolidation noise, consolidation delay and consolidation loss [2, 3]: Consolidation noise results due to inaccuracies in the information contents of the BRM cells received at the source. When, only a subset of the branches are considered at a branch-point for consolidation then the resulting inaccuracy is known as consolidation noise of type 1. Another type of consolidation noise, known as consolidation noise of type 2, can occur where the information, that more bandwidth is available at a previously congested branch, may be lost in the consolidation P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 815–824, 2001 © Springer-Verlag Berlin Heidelberg 2001

816

M. Shamsuzzaman, A.K. Gupta, and B.-S. Lee

process. Consolidation delay arises when a BRM cell incurs additional delay at a branch-point because of consolidation. Usually a branch-point waits for a FRM cell from the upstream node or BRM cell(s) from downstream branch(es) before the consolidated BRM cell can be passed. Consolidation loss occurs from the excessive loss of BRM cells that are discarded at a branch-point in the consolidation process and thus resulting in the loss of information. It is desirable that the ratio of BRM cells to FRM cells at source should be one. In this paper, we introduce a new approach for consolidation of BRM cells at branch-points, which utilizes the information contents of a BRM cell to decide whether to pass it or not and thus it avoids delay as well as loss of critical information.

2 Related Research-Work A number of algorithms have been proposed in the literature for extending point-topoint ABR flow control to p-mp connections [2-7]. Various design options and implementation alternatives of existing algorithms can be found in [4]. In [2], consolidation algorithms have been classified based on (1) feedback information storing method for consolidation and, (2) BRM cell returning condition. Most of the existing algorithms use per-VC accounting for storing feedback information. In per-VC accounting, a single set of variables is maintained at each branch-point of a VC to store the consolidated information. Whenever, a BRM cell returning condition occurs, a BRM cell is sent to the upstream node and these variables are refreshed to their default values. Depending upon what the BRM cell returning condition is, per-VC accounting may avoid the consolidation noise of type 1 but generally not of type 2. The reason is, in-between the time the variables are refreshed and the next BRM cell returning condition occurs, only the most constraining values are stored at a branch-point, and thus the consolidation does not immediately take note of the bandwidth constraints being relaxed at an earlier congested branch. Consequently, in [2], per-branch accounting for each VC has been proposed, where the consolidated information of the BRM cells is stored on a perbranch basis at each branch point of a connection. Using per-branch accounting, it is possible to keep up-to-date information of all branches at all the time and thus it can avoid consolidation noise of both types. Now, we turn our focus on the BRM cell returning conditions, which can best be described by citing the consolidation algorithms. Roberts [5] proposed a consolidation algorithm a branch-point passes the consolidated information to its upstream node by generating a BRM cell immediately after receiving a FRM cell. Despite of its fast transient response, Roberts’ algorithm suffers from high consolidation noise [4], because the sent BRM cell may not contain information even of a single branch. In order to reduce such noise, Tzeng [6] improved this algorithm by ensuring that a branch-point will return a BRM to its upstream node only when it receives at least one BRM cell from its branches after the last feedback was sent. In [7], Ren et al have claimed that generating BRM cells leads to higher complexity at the switches and proposed two alternative algorithms. In the first algorithm, the first BRM cell, received after receiving a FRM cell, is passed to the upstream node. However, this algorithm exhibits similar consolidation noise as that

A New Algorithm for Point-to-Multipoint ABR Service in ATM Networks

817

shown by the scheme in [6]. In their second algorithm, which is known as ‘wait-forall’ algorithm, Ren et al have proposed that a BRM cell should be passed only when a branch-point receives BRM cells from all of its branches. Since a branch-point has to wait for the BRM cells from all the branches, the waiting time may be long, resulting in very slow transient response. To alleviate the slow transient response problem, fast overload indication technique has been proposed in [4]. Although, the fast overload indication technique improves the transient response, it is unable to respond to an under-load condition where the source is entitled to increase its rate.

3 Proposed Algorithm 3.1 Responsibility of a Branch-Point The fundamental responsibility of a branch-point is to notify the minimum cell-rate that can be supported by its all branches at any instant of time. To do so, it should send a BRM cell, whenever, any of the following two events takes place: • The branch-point receives a BRM cell from one of its branches with lower ER value than the last ER value passed to the upstream node by this branch-point. This event implies that there is a new bandwidth constraint at the branch-point that must be made known to the upstream node, which may ultimately lead to reduction in the ACR of the source. Whenever, this event takes place, the branchpoint will tag that branch as the bottleneck branch. • The branch-point receives a BRM cell from the bottleneck branch with a higher ER value than that passed to the upstream node by this branch-point. This event implies that now the branch-point can support a higher throughput. In this case, the source may increase its ACR if all other branches of the multicast tree can support that. Apart from these two cases, the BRM cells carry no additional information for a source to compute precise ACR value, and therefore, such BRM cells should be discarded. Thus, in our proposed algorithm, we focus on the above two simple events. 3.2 Proposed Algorithm The key ideas in our basic algorithm are as follows: 1. Each branch-point stores the feedback information on a per-branch basis for each VC, and 2. A branch-point passes the BRM cell whenever any of the two conditions, as explained in Section 3.1, takes place. Following variables are used in the implementation of the algorithm. Each branchpoint maintains array of variables MER[i], MNI[i], and MCI[i] to store the values of explicit rate, no increase indication and congestion indication, respectively, carried by the BRM cell of branch i. At each branch-point, a register MER1 stores the bottleneck ER value, and a pointer PTR1 points to the bottleneck branch, i.e., the branch that supports the minimum ER. Now we discuss the normal operation of the algorithm.

818

M. Shamsuzzaman, A.K. Gupta, and B.-S. Lee

Whenever, a BRM cell is received at a branch-point from branch i, corresponding MER[i], MNI[i], and MCI[i] values are updated, and the value of ER received, ERBRM, is compared with that of the MER1, the current bottleneck value. If the ERBRM is less than MER1, the branch-point discovers a new bottleneck ER, and thus that BRM cell is passed with the bottleneck ER value. The values of MER1 and PTR1 are assigned to ERBRM and i, respectively. In our algorithm, as the bottleneck branch is always tagged by the PTR1 pointer, a BRM cell from branch PTR1 with higher ER value signifies congestion relieve at the bottleneck branch, and thus the BRM cell is passed to its upstream node with min MER[i]. Consequently, the new bottleneck ER and the corresponding branch are assigned to the MER1 and PTR1, respectively. In all other cases, the BRM cells are discarded at the branch-point. The Congestion Indication (CI) flag and the No Increase (NI) flag of a BRM cell also affect the computation of ACR at the source. So, our algorithm incorporates these two flags as well. The pseudo code of the algorithm is given below. Upon receiving an FRM (ER, CI, NI) cell: Multicast the FRM cell to all participating branches at the branch-point. Upon receiving a BRM (ER, CI, NI) cell from branch i: Let MER[i] = ER, MCI[i] = CI, and MNI[i] = NI; If (ER < MER1) MER1 = ER, PTR1 = i; Pass the BRM cell to the upstream node; Else if (( PTR1 == i) and (ER > MER1)) Let MER1 = ER = min(MER[j]) , CI = or(MCI[j]), and NI = or(MNI[j]) for all participating branches j; Let PTR1 = j for which MER1 = = MER[j]; Pass the BRM cell to the upstream node; Else Discard this RM cell. At a branch-point in this algorithm, MER1 and MER[i] for all branches are initialized to PCR and the pointer PTR1 is initialized to 0. A timer can be easily incorporated at each branch-point to detect whether or not the branch PTR1 is responsive. If the timer finds the bottleneck branch PTR1 non-responsive, that branch is cut off from the multicast tree and the first available BRM cell is passed with new bottleneck ER, and MER1 and PTR1 are updated accordingly.

4 Performance Evaluation We compare the performance of our proposed algorithm with that of the wait-for-all algorithm since it has been incorporated in the ATM Forum recommendation [1].

A New Algorithm for Point-to-Multipoint ABR Service in ATM Networks

819

4.1 Parameter Values In simulation, the link length between the ABR end stations and their access switches is 10 Km, and each link has a bandwidth of 150 Mbps. All the sources are assumed to be persistent. The minimum cell rate (MCR), initial cell rate (ICR) and peak cell rate (PCR) for each ABR VC are 0.1, 3.0, and 150 Mbps, respectively. Other ABR parameters are identical for each VC and are selected as recommended in [1]. The switches are assumed to be adopting Explicit Rate Indication for Congestion Avoidance (ERICA) algorithm [9] with a target link utilization of 90%. Whenever a BRM cell is received at a branch-point, the received ER value is compared with the ER permitted by ERICA, and then the BRM cell is disposed or passed as decided by the consolidation algorithm. 4.2 Network Model I Our first network model is selected to investigate the scalability of the consolidation algorithms in terms of number of hops and level of branching. Fig. 3.1 illustrates the Network Model I. The link distance between the switches S1 and SN is maintained at 1000 Km regardless of the value of N, which represents the levels of branching. In this model, p-mp ABR source is assumed to have 10 independent VCs with identical parameters so that the fairness among the VCs can also be observed. A point-to-point variable bit rate (VBR) VC is used to serve as the background traffic on the link connecting SN and SN+1, and thus it is the bottleneck link. The VBR source is periodically high (130 Mbps) and low (20 Mbps), each for 100 ms duration. p-mp ABR Source

VBR Source

A

B

S0

Si

S1 dA 1 100 km

SN

Bottleneck Link

S N+1

dA i 1000 km

dA N

dA N+1

dB

1000km

Fig. 1. Network Model I

In Fig. 2 and Fig. 3, we study the behavior of a single VC, which is randomly selected out of the 10 p-mp VCs. In Fig. 2, the value of N is 2, and in Fig. 3, it is 10. In the figures, the changes in the ACR of the selected VC are shown with respect to the changes in the VBR background load. Both the algorithms show smooth changes in the ACR with respect to the background load. However, the proposed algorithm shows faster response in comparison to the wait-for-all algorithm, which is more prominent when the value of N increases from 2 to 10. The reason is, the wait-for-all algorithm suffers from consolidation delay, which further increases with the increase in the number of hops. The slow response, in turn, limits the average throughput of the VC severely. Therefore, the wait-for-all algorithm is not scalable. On the other

820

M. Shamsuzzaman, A.K. Gupta, and B.-S. Lee

hand, Figs 2 and 3 clearly illustrate that our proposed algorithm does not suffer from the consolidation delay, and the performance is completely insensitive to the number of hops. The reason is, a branch-point does not have to wait for any cell returning condition to occur after it discovers that there is a critical information to pass. We also observed the queue lengths under these algorithms (Fig. 4 and 5). The proposed algorithm achieves lower queue length at the bottleneck link than the waitfor-all algorithm except initially. The reason is, the local variable MER1 to store the bottleneck ER at a branch-point is initialized to PCR of the VC, and due to the network topology the first BRM is received at a branch-point is from a non-bottleneck link. So, initially, the source ACR is higher than the bottleneck rate until a BRM cell is received from the bottleneck branch. After detecting the actual bottleneck ER value, the ACR of the source is governed by the minimum ER value supported by all the branches of a branch-point without additional delay imposed by consolidation. Therefore, after the initial period, the queue length is smaller than the wait-for-all algorithm, which suffers from consolidation delay. The Wait-for-all algorithm provides high link utilization (94%) when N = 2, but it decreases to 86% with the increase in N = 10. Our algorithm provides high link utilization (97%) in both the scenarios. Both algorithms show excellent fairness among different VCs. Although, the proposed algorithm does not lose any critical information at a branch-point, it has a very low value for the BRM to FRM cells ratio at the source (0.39 for N = 2, and 0.36 for N = 10).

4 Further Study of Our Proposed Algorithm A close observation of our proposed algorithm reveals that it is not free from all deficiencies. There are mainly three problems: 1. The initial transient response of the proposed algorithm is not satisfactory. 2. The ratio of BRM cells to FRM cells at the source is very low. Moreover, it is also possible that our algorithm may introduce feedback implosion due to high fluctuations in the load at a particular branch, as there is no check for this possibility in our basic algorithm. 3. In per-branch accounting, the variables required to store the feedback information increase with the increase in the number of branches. Thus, feedback-storing method is not scalable in terms of the number of variables required. This problem is common to all consolidation algorithms, which use per-branch accounting method. Now we propose solutions to the above mentioned problems. In response to the first problem, we made a simple modification in our algorithm that the first BRM cell from a branch-point is passed to its upstream node only after receiving the BRM cells from all of its branches. In a way, the wait-for-all algorithm is incorporated in our algorithm for generating the first BRM cell at each branch-point. For the second problem, i.e., low value of BRM to FRM cell ratio, the following modification is made. A branch-point maintains two other variables for each p-mp VC, one to store the number of FRM cells received (say, numFRMreceived) and the second variable to store the number of BRM cells passed to the upstream node (say, numBRMpassed). The respective variables is incremented whenever a FRM cell is received or a BRM cell is passed to the upstream node. To keep the ratio of BRM

A New Algorithm for Point-to-Multipoint ABR Service in ATM Networks Comparison of ACRs when N = 2 3.0E+07

1.8E+08 VBR Background Load Wait-for-All algorithm

1.6E+08

Proposed Algorithm

2.5E+07 1.4E+08

2.0E+07

1.2E+08

1.0E+08 1.5E+07 8.0E+07

6.0E+07

1.0E+07

4.0E+07 5.0E+06 2.0E+07

0.0E+00

0.0E+00 0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Time (sec)

Fig. 2. The Changes in ACR of the point-to-multippoint VC with N = 2 Comparison of ACRs when N = 10 1.8E+08

3.0E+07 VBR Background Load Wait-for-All algorithm

1.6E+08

Proposed algorithm

2.5E+07 1.4E+08

1.2E+08

2.0E+07

1.0E+08 1.5E+07 8.0E+07

6.0E+07

1.0E+07

4.0E+07 5.0E+06 2.0E+07

0.0E+00

0.0E+00 0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Time (sec)

Fig. 3. The Changes in ACR of the point-to-multippoint VC with N = 10

Fig. 4: Queue Length at Bottleneck Link in Network I, N = 2

821

822

M. Shamsuzzaman, A.K. Gupta, and B.-S. Lee

cells to FRM cells close to unity at the source, we modify our algorithm so that the branch-point can pass the BRM cell with the current minimum ER value (MER1) if (numBRMpassed/numFRMreceived) < 0.90, even if the BRM cell does not contain any critical information. To guard against the possibility of feedback implosion, we incorporate RMratio (numBRMpassed/numFRMreceived) to determine the BRM cell returning condition in the following way. Whenever the ratio is greater than unity, ER < (MER1 / RMratio) is considered as the occurrence of new bottleneck and ERPTR1 > (MER1 * RMratio) signifies the congestion relieve at bottleneck link i, and a BRM cell is passed accordingly.

Fig. 5: Queue Length at Bottleneck Link in Network I, N = 10 Now we will focus on how to minimize the number of local variables to store the feedback information at a branch-point. In our algorithm, ER for each branch is stored so that whenever congestion is relieved on the bottleneck branch, the most constraining ER can be found from the stored variables. To reduce the number of variables at a branch-point, we can store just few lowest ER values with their corresponding branch pointers. To illustrate the performance after modifications of our basic algorithm to cope with the first two problems and with a reduced number of variables at a branch-point, we consider Network Model II shown in Fig. 6. In the figure, each branch-point has 25 branches. Switch S2 has 20 ABR destinations and it connects to 5 downstream switches, S3 to S7. The switches S3 to S7 have 25 ABR destinations each. Source A is a p-mp ABR source, and sources B to E provide on-off background traffic for each link from switch S2 to other five switches (S3 - S7). The VBR sources are periodically high (130 Mbps) and low (20 Mbps) with 100 ms duration for each. The phase difference between two consecutive sources (B and C, C and D, and so on) is 10 ms. In Fig. 7, the changes in the ACR of the p-mp ABR VC are compared of the perbranch accounting method with that of using reduced numbers of variables at branchpoints. Although, the background load is not shown, the VBR source B starts transmission at time zero at high rate followed by the transmission at high rate by the source C after 10 ms, and so on. Therefore, the congestion at the link between switches S2 and S3 is relieved after 100 ms, the ACR does not increase before 150 ms

A New Algorithm for Point-to-Multipoint ABR Service in ATM Networks

823

due to congestion at the other links. So the changes in the ACR of the point-tomultipont VC is fully in accordance with the changes in the background traffic at different links. The ratio of the BRM cells to FRM cells at the source is 0.89. Instead of using 25 variables to store the ER values received from BRM cells at each branchpoint, we used only 6 variables to store the lowest six ERs, which are extracted from the BRM cells received from the downstream nodes. In addition to this, six pointers are used to point to those six corresponding branches at each branch-point. The response to the changes in the background load using reduced numbers of variables is as fast as that with the per-branch accounting, though some glitches are introduced. The glitches occur at some of the instants when background load is changing. However, that may be tolerable compared to the benefits achieved using less number of variables at a branch-point, especially when there are a very large number of branches.

S3

dB dA3

S4

p-mp ABR Source

B

A

C

S1

D

E

F

S5

S2

dC dA4

dA5

1000km

X 25

dF

S7

1000km

X 25

dE dA6

dA2

X 25

dD

S6

X 20

X 25

dA7

X 25

Fig. 6. Network Model II

5 Conclusions There are two main contributions of this paper: (i) the fundamental responsibilities of a branch-point in a p-mp ABR connection have been clearly identified, and (ii) an efficient consolidation algorithm has been proposed. In our basic algorithm, we adopted per-branch accounting to avoid consolidation noise of any types. Moreover, we used the information content of the BRM cells to decide whether to pass a BRM cell from a branch-point or not, and thus it is free from consolidation delay. We compared the performance of our basic algorithm with that of an existing wait-for-all algorithm. We found our algorithm is scalable in terms of number of levels of branching, has fast response, and it provides accurate feedback. The queue length at a bottleneck link is similar to the one achieved under the wait-forall algorithm but a little bit higher initially due to the poor transient performance. The throughput of the bottleneck link is excellent, and the fairness among the VCs (pointto-point and p-mp) is superb.

824

M. Shamsuzzaman, A.K. Gupta, and B.-S. Lee

Comparing per-branch accounting with reduced number of variables with required modifications 1.4E+08 With Reduced Number of Variables With per-branch accounting

1.2E+08

1.0E+08

8.0E+07

6.0E+07

4.0E+07

2.0E+07

0.0E+00 0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Time (sec)

Fig. 7. Comparing the changes in ACR using per-branch accounting and using reduced number of variables with Network Model II

References 1. ATM Forum Technical Committee, “Traffic Management Specification Version 4.1”, aftm-0121.000, Mar. 1999. 2. D-H. Kim, Y-Z. Cho, Y-Y.An, and Y. Kwon, “A Scalable Consolidation Algorithm for Point-to-Multipoint ABR Flow Control in ATM Networks,” in Proceedings of ICC’99, vol. 1, pp. 118-123, Jun. 1999. 3. Y-Z. Cho, S-M. Lee and M-Y. Lee, “An Efficient Rate-Based Algorithm for Point-toMultipoint ABR Service,” in Proceedings of IEEE GLOBECOM’97, Dec. 1997. 4. S. Fahmy, R. Jain, S. Kalyanaraman, R. Goyal, B. Vandalore, and X. Cai, “Performance analysis of ABR point-to-multipoint connections for bursty and nonbursty traffic with and without VBR background,” ATM Forum/97-0422, Apr. 1997. 5. L. Roberts, “ Rate based algorithm for point to multipoint ABR service,” ATM Forum/940772R1, Nov. 1994. 6. H.-Y. Tzeng and K.-Y. Siu, “On Max-Min Fair Congestion Control for Multicast ABR Service in ATM,” IEEE Journal on Selected Areas in Communications, vol. 15, no. 3, pp. 545-555, Apr. 1997. 7. W. Ren, K.-Y. Siu, and H. Suzuki, “On the performance of congestion control algorithms for multicast ABR service in ATM,” in Proceedings of IEEE ATM’96, Aug. 1996. 8. R. Jain, S. Kalyanaraman, R. Goyal, S. Fahmy, and R. Viswanathan, “ERICA Switch Algorithm: A Complete Description,” ATM Forum/96-1172, Aug 1996.

Experimental TCP Performance Evaluation on Diffserv Assured Forwarding over ATM SBR Service Shigehiro Ano1 , Nicolas Decre2, , and Toru Hasegawa1 1

KDDI R&D Laboratories Inc, 2-1-15 Ohara Kamifukuoka-shi, Saitama 356-8502, Japan, {ano,decre,hasegawa}hsc.kddilabs.co.jp 2 Ecole Nationale Superieure des Telecommunications, Paris, France, [email protected]

Abstract. In these days, the deployment of Diffserv (Differentiated Services) that enables the QoS guarantee is urgently required by the IP network customers. However, AF (Assured Forwarding) PHB (Per Hop Behavior) in Diffserv still has not been provided by conventional routers. It is a realistic solution that SBR3 (Statistical Bit Rate 3) of ATM emulates AF PHB, but it is not clear whether TCP traffic over AF PHB emulated by ATM is differentiated from the best effort TCP traffic over DF (Default Forwarding) PHB. To confirm the differentiation, we have experimentally studied TCP performance through the link into which TCP connections over AF PHB and DF PHB is aggregated. This paper describes the experimental results and discusses the possibility of the TCP performance differentiation between AF PHB and DF PHB over ATM.

1

Introduction

According to the growing demand for QoS guaranteed services over IP networks, the deployment of Differentiated Service (DiffServ)[1] is urgently required. Among the Diffserv PHBs (Per Hop Behaviors), EF (Expedited Forwarding) PHB[2] has been already supported by commercial routers. However, AF (Assured Forwarding) PHB[3] has been evaluated only by simulation studies[4][5]. Since AF PHB was not supported by commercial routers, it is an alternative solution to deploy AF PHB over ATM SBR3 (Statistical Bit Rate 3) [6] service with SCD (Selective Cell Discard) [7][8]. In order to evaluate the feasibility, we have experimentally evaluated the performances of AF PHB and DF (Default Forwarding) PHB over ATM services. The various experiments were performed to evaluate the differentiation of PHBs from the viewpoints of TCP throughput and fairness. The objective is to know whether TCP flow control mechanisms 

The author was engaged in this work through the internship at KDDI R&D Laboratories Inc.

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 825–835, 2001. c Springer-Verlag Berlin Heidelberg 2001 

826

S. Ano, N. Decre and T. Hasegawa

can guarantee TCP throughput equal to the bandwidth provided by Diffserv AF PHB. The results show that Diffserv over ATM service is a practical solution for the early deployment of Diffserv services.

2 2.1

Diffserv AF PHB over ATM Diffserv AF PHB

AF PHB is used to build an assured bandwidth end-to-end service without jitter/latency guarantee. Four classes are defined in terms of allocated network resources such as buffer space and bandwidth. Within each class, IP packets are marked with one of the three drop precedence values. The drop precedence values are changed by the policer that watches whether the traffic is conforming to the subscribed rate or not. Depending on the drop precedence values, the packets are scheduled to drop or queue in the congestion periods. The traffic contract of service implemented by AF PHB consists of assured packet rate and maximum burst size. 2.2

Mapping of PHBs and ATM Services

(1) AF PHB It is a natural way to map AF PHB to SBR3 with SCD in ATM, as discussed by the ATM Forum[9]. In SBR3, a traffic contract consists of PCR for CLP (Cell Loss Priority) = 0+1 [PCR01], SCR (Sustainable Cell Rate) and MBS (Maximum Burst Size) values for CLP=0 [SCR0, MBS0]. The traffic contracts of AF PHB and ATM SBR3 are mapped in the following way: SCR0 and MBS0 correspond to “Assured Packet Rate” and ”Maximum Burst Size”, respectively. The CLP of SBR3 is mapped to AF drop precedence values. CLP=0 and CLP=1 correspond to high drop precedence value and medium / low drop precedence values, respectively. The marking and dropping of AF PHB is emulated by ATM switches in the following way: When the queuing traffic exceeds the upper boundary ratio (SCD threshold) of ATM switch buffer size, SCD function starts the discard of cells with CLP=1 in advance to the cell discard by the buffer overflow. In case of no congestion, violation cells are only tagged to CLP=1. (2) DF PHB DF PHB is a best effort forwarding; so, it is mapped to ATM UBR (Unspecified Bit Rate) service.

3 3.1

Overview of Experiments Testing Methods

Diffserv Assured Forwarding over ATM SBR Service

827

1. To confirm the differentiation of TCP throughput level, we compare between AF PHB and DF PHB during the congestion periods. 2. PVP (Permanent Virtual Path) of SBR3 is used to transfer an aggregate of the traffic forwarded by AF PHB. A PVP of UBR is used to transfer an aggregate of DF PHB. 3. The above PVPs are concentrated on a trunk line between ATM WAN switches, and the congestion will occur at the output port to the trunk line where AF PHB is carried out. 4. Each PVP accommodates multiple TCP/IP connection. 5. The ATM traffic contract values of PVP for AF PHB are determined as follows: PVP emulating AF PHB (SBR3 with SCD): P CR01 = “T runk line speed”

(1)

“T runk line speed” “N umber of P V P s”

(2)

SCR0 =

M BS0 ≥

γ 

λi

(3)

i=1

Here, γ : = Number of accommodated TCP connections into this PVP connection λi : = Number of cells when the data corresponding to each TCP send/receive socket buffer size is consecutively transferred by ATM. Equation (3) comes from the experimental results in reference [10]. 3.2

Experimental Configuration

Figure 1 shows the configuration of the experiments. Eight PCs (Personal Computers: Pentium III 500MHz and Solaris 7) with an ATM NIC (Fore PCA-200) are used. These are connected to an ATM LAN switch (Fore ASX-200BX) and an ATM WAN switch (Fore ASX-200BX) via eight OC3-c lines. Each PC establishes TCP connections with different PCs. The number of TCP connections established by one PC is six and each PC pair has two TCP connections with the different TCP port numbers. Therefore, each of eight VPs which correspond to eight OC3-c lines has six TCP connections and the total number of TCP connections for this testing is 48. Each TCP connection is mapped to one VC. At the ATM LAN switch, the VCs with the same destination are switched into the same output OC3-c line. It should be noted that cell loss due to the buffer

828

S. Ano, N. Decre and T. Hasegawa

PC (Solaris) PC (Solaris)

VP Switching for TCP Data Segments from Customer to Network after UPC ATM LAN Switch ATM WAN Switch Fore ASX-200 Fore ASX-200

Congestion Output Port ATM WAN Switch Fore ASX-200

OC-3c (155Mbps)

VC Switching

PC (Solaris)

VC Switching

PC (Solaris) PC (Solaris) PC (Solaris) PC (Solaris) PC (Solaris) Sender/Receiver Side

OC-3c (155Mbps)

OC-3c (155Mbps)

Customer Premises

VC Switching for TCP Data Segments from Network to Customer

Data Channel Simulator ADTECH SX/14

Wide Area Network

Fig. 1. Exprimental Configuration

overflow does not occur at ATM LAN switch. At the ATM WAN switch, eight input lines are multiplexed into one OC3-c output line handled as the ATM WAN trunk line. The output buffer size for each PHB in the ATM WAN switch is set to 10000 cells. The data channel simulator (ADTECH SX/14) for insertion of propagation delay is connected. The VPs are maintained between the output ports of the ATM LAN switches and the input port of the second ATM WAN switch. VP level UPCs are performed at the first ATM WAN switch. We need to say that the second ATM WAN switch is introduced just because of the limitation of number of VPs supported by Fore ASX-200BX. A free software module, ttcp, for TCP throughput measurement is used in the TCP/IP communication between PCs. It can calculate TCP throughput in the case that a greedy transmitter like ftp is used, by varying the values of various TCP parameters, such as TCP window size and the user data size. The TCP window size is set to 48 kbyte. The user data size and MSS (Maximum Segment Size) is fixed to 8192byte. Based on the principle described in section 2.1, ATM traffic contract values are set as follows: P CR01 = 149.76M bit/s SCR0 = 18.72M bit/s M BS0 = 8256cell SCD threshold is fixed to 90% through the testing. During the ttcp execution, we also measure the packet queuing delay using 2048byte ICMP (Internet

Diffserv Assured Forwarding over ATM SBR Service

829

Control Message Protocol) packet by ping command over the route of TCP connections. As for PCR shaping at the PCs, 35 Mbit/s including the cell header is adopted. The duration of each TCP throughput measurement is fixed to 180 seconds and the RTT (Round Trip Time) value is set to 20ms, 80ms or 160ms.

4 4.1

Results of TCP Performance Measurement Differentiation between AF PHB and DF PHB

Under the configuration of Fig.1, we measured the throughput of each TCP connection under SBR3 with SCD for AF PHB and UBR for DF PHB. Two PVPs are devoted to AF PHB and other PVPs to DF PHB. Figure 2 shows each TCP throughput in the case of RTT = 80ms. TCP connections whose identifier are from #1 to #12 use PVPs for AF PHB and TCP connections whose identifier are from #13 to #48 use PVPs for DF PHB.

TCP Throughputs [MBits/s]

Queuing Delay: 0ms (min) / 0 ms (ave) / 7ms (max)

Queuing Delay: 0 ms (min) / 8 ms (ave) / 48ms(max)

PVP for AF #1

PVP for AF #2

PVP for DF

PVP for AF #1/2 2 : PCR01=149.76Mbit/s, SCR0=18.72Mbit/s, MBS0=8256cell RTT : 80 ms

TCP connection Identifier

Fig. 2. Each TCP Throughput under PVPs for AF and DF PHBs

As shown in the figure, the AF and DF are differentiated from the viewpoint of TCP throughput. To analyze the throughput values quantitatively, estimated TCP throughput values for AF PHB and DF PHB are calculated based on the following assumption:

830

S. Ano, N. Decre and T. Hasegawa

Assumption: – The residual bandwidth with the exception of the subscribed traffic rate for PVPs for AF PHB is equally shared by the all PVPs for AF and DF PHBs. – According to TCP behavior and ttcp software, the size of all transmitted TCP segments is MSS (=8192byte). – A 8192byte TCP segment is transferred by 172 ATM cells. It is because the TCP segment is appended to TCP/IP header (=40byte), LLC/SNAP header (=8byte) and AAL type 5 trailer and padding field. – Total bandwidth in ATM level is 149.76Mbit/s and traffic contract value of AF in ATM level is 18.72Mbit/s as described in section 3.2. Calculation: (DF PHB) 149.76M bit/s − 18.72M bit/s × 2 8 P V P connections = 14.04M bit/s

“Estimated P V P bandwidth” =

8192byte 172cell × 53byte “Estimated T CP throughput” = 6 T CP connections = 2.10M bit/s 14.04M bit/s ×

(AF PHB) “Estimated P V P bandwidth” = 14.04M bit/s + 18.72M bit/s = 32.76M bit/s 8192byte 172cell × 53byte “Estimated T CP throughput” = 6 T CP connections = 4.91M bit/s 32.76M bit/s ×

The average TCP throughput values of Fig.2 are almost close to the estimated values. The differences may be due to cell loss and the consequence of TCP retransmission bandwidth. On the other hand, the average queuing delay of PVP for AF PHB is 0ms and the maximum queuing delay is 7ms. These results are largely smaller than 8ms average delay and 48ms maximum delay in PVPs for DF PHB. In the case of 20ms RTT (heavy congestion), the similar results of throughput and queuing delay could be observed, but, in the case of 160ms RTT (no congestion), the no differentiation could be observed.

Diffserv Assured Forwarding over ATM SBR Service

4.2

831

Different Assured Packet Rates of AF PHB

Aggregated TCP Throughput within a PVP [Mbit/s]

The experiments changing SCR and MBS values were performed to study the differentiation between the traffic contracts of different assured packet rates. The following PVPs are adopted for testing:

PVP for AF #1 1: PCR01=149.76Mbit /s, SCR0=18.72Mbit/s, MBS0=8256cell

PVP for AF #2 2 : PCR01=149.76Mbit/s, SCR0=2.12Mbit/s-18.72Mbit/s, MBS0=8256cell PVP for DF

SCR0 of PVP for AF #2 [Mbit/s] Fig. 3. Effect of SCR0 with RTT = 80ms

– The traffic contract values of one PVP for AF PHB is the same as those in section 3.2. We call this PVP AF #1. – The traffic contract values of the other PVP for AF PHB is the same as PVP AF #1 except for SCR0 or MBS0. Either SCR0 or MBS0 is changed during the experiments. We call this PVP AF #2. – The other six PVPs are used for DF PHB. UBR is applied to those PVPs. 4.2.1 Effect of SCR0 Figure 3 and Figure 4 show the results for change of SCR0 when RTT values are set to 80ms and 160ms, respectively. To evaluate the resource allocation to AF #2, we estimated the TCP throughput aggregate. In the case of RTT = 80ms, the values are calculated based on the assumption in section 4.1. However, in the case of RTT = 160ms, the values are calculated by the following equation: “Estimated T CP throughput aggregate” =

µ × α RT T + δ

(4)

S. Ano, N. Decre and T. Hasegawa

Aggregated TCP Throughput within a PVP [Mbit/s]

832

PVP for AF #1 : PCR01=149.76Mbit /s, SCR0=18.72Mbit/s, MBS0=8256cell

PVP for DF

PVP for AF #2 2: PCR01=149.76Mbit/s, SCR0=18.72Mbit/s, MBS0=200cell-8256cell

SCR0 of PVP for AF #2 [Mbit/s] Fig. 4. Effect of SCR0 with RTT = 160ms Table 1. TCP Throughput Aggregate in the Case of Various SCR0 Values RTT 80ms 160ms

SCR0

18.72Mbit/s 14.84Mbit/s 10.60Mbit/s 6.32Mbit/s

2.12Mbit/s

Estimated 29.44Mbit/s 26.39Mbit/s 23.05Mbit/s 19.69Mbit/s 16.39Mbit/s Measured 25.72Mbit/s 25.52Mbit/s 24.01Mbit/s 21.23Mbit/s 14.33Mbit/s Estimated 14.48Mbit/s 14.48Mbit/s 14.48Mbit/s 14.48Mbit/s 14.48Mbit/s Measured 13.80Mbit/s 13.62Mbit/s 13.49Mbit/s 13.06Mbit/s 12.72Mbit/s

Here, µ : = “T CP send/receive socket buf f er size set in P V P f or AF #2” δ : = “Data sending out time to AT M line” α : = “N umber of the accommodated T CP connections” Table 1 shows the estimated values along with the measured values. In the case of RTT = 80ms, the measured values are almost the same as the estimated values below SCR0=14.84Mbit/s. This means that the TCP aggregate of AF #2 is allocated the fair share of the residual bandwidth. However, if the SCR0 becomes larger value than 14.84Mbit/s, the TCP aggregate of AF #2 cannot get the bandwidth equal to the fair share. The upper bound of SCR0 value becomes smaller value (10Mbit/s) in the case of RTT = 20ms. This is because

Diffserv Assured Forwarding over ATM SBR Service

833

the increase of SCR0 triggers the increase of the ATM switch buffer overflow that interferes to differentiate AF PHB from DF PHB by SCD function. In that sense, the upper bound of SCR0 value must be lowered in accordance with the increase of congestion level. In the case of RTT = 160ms, the total bandwidth delay product of TCP connections is not always enough large to fulfill TCP data in the network. In other words, the link is not always utilized due to the small window sizes of TCP. In this case, the bandwidth of PVP whose SCR0 is smaller cannot get not only the subscribed rate but the residual bandwidth. This is because the number of discarded cells by SCR function increases according to the decrease of SCR0 value. Therefore, the lower bound of SCR0 value also be considered in the light congestion. Based on the above discussions, it can be summarized that the differentiation to assured packet rates is realized within the range of certain SCR0 value. The upper/lower bound of SCR0 value is determined by the congestion level as described above. 4.2.2 Effect of MBS0

Aggregated TCP Throughput within a PVP [Mbit/s]

As for influence of MBS, no influences can be observed independent of the congestion level (RTT=20ms, 80ms, 160ms). Figure 5 shows the result. We can say that changing MBS0 values have no effect on the differentiation between AF PHB classes.

PVP for AF #1 1: PCR01=149.76Mbit /s, SCR0=18. 72Mbit/s, MBS0=8256cell

PVP for AF #2 2: PCR01=149.76Mbit/s, SCR0=18.72Mbit/s , MBS0=200cell-8256cell

PVP for DF

MBS0 of PVP for AF #2 [cell]

Fig. 5. Effect of MBS0 with RTT = 80ms

834

5

S. Ano, N. Decre and T. Hasegawa

Conclusions

The goal of the above experiments was to study the differentiation between AF PHB and DF PHB over the ATM PVP services. We mapped AF PHB to SBR3 with SCD and DF PHB to UBR respectively. Using this mapping strategy, many experiments by altering the traffic contract values in the ATM WAN switches are carried out. The following results are obtained: 1. The TCP throughput differentiation between AF PHB and DF PHB over the ATM networks is realized during the congestion. ATM SBR3 with SCD can assign each TCP connection belonging to the PVPs for AF PHB the estimated TCP throughput. On the other hand, the average queuing delay of PVP for AF PHB is largely smaller than that for DF PHB. 2. The differentiation to assured packet rates can be realized under the following conditions. First, the upper bound of the setting rate for the fair share becomes smaller when the congestion level becomes heavier. On the other hand, the lower bound becomes larger when the congestion level becomes lighter. In any case, accommodated TCP aggregate must use window sizes large enough for the bandwidth delay product of the network. 3. The differentiation to maximum burst size cannot be realized independent of RTT value. It can be concluded that maximum burst size set for TCP aggregate has no effect on TCP throughput aggregate. Consequently, ATM SBR3 with SCD is a practical way to realize the Diffserv Assured Forwarding using the commercial products.

References 1. S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss, “An Architecture for Differentiated Services,” IETF RFC2475, December 1998 2. V. Jacobson, K. Nichols, and K. Poduri, “An Expedited Forwarding PHB,” IETF RFC2598, June 1999 3. J. Heinanen, F. Baker, W. Weiss, and J. Wroclawski, ”Assured Forwarding PHB Group,” IETF RFC2597, June 1999 4. D. Clark and W. Fang, “Explicit Allocation of Best Effort Packet Delivery Service,” IEEE/ACM Transactions on Networking, Volume 1, Number 4, pp.397-413, August 1998 5. J. Ibanez and K. Nichols, “Preliminary Simulation Evaluation of an Assured Service,” Internet Draft, ¡draft-ibanez-diffserv-assured-eval-00.txt¿, August 1998 6. ITU-T recommendation I.371, “Traffic Control and Congestion Control in B-ISDN,” Geneva 1996 7. S. Ano, T. Hasegawa, and T. Kato, “A Study on Accommodation of TCP/IP Best Effort Traffic to Wide Area ATM Network with VBR Service Category Using Selective Cell Discard,” IEEE ATM’99 Workshop, pp.535-540, May 1999 8. S. Ano, T. Hasegawa, and T. Kato, “An Experimental Study on Performance during Congestion for TCP/IP Traffic over Wide Area ATM Network Using VBR with Selective Cell Discard,” IEICE Transactions on Communications, Volume E83-B, Number 2, pp.155-164, February 2000

Diffserv Assured Forwarding over ATM SBR Service

835

9. O. Aboul-Magd et al., “Mapping of Diff-Serv to ATM Categories,” The ATM Forum / 99-0093, 1999 10. S. Ano, T. Hasegawa, T. Kato, K. Narita, and K. Hokamura, “Performance Evaluation of TCP Traffic over Wide Area ATM Network,” IEEE ATM’97 Workshop, pp.73-82, May 1997

PMS: A PVC Management System for ATM Networks Chunsheng Yang and Sieu Phan National Research Council of Canada, Canada {Chunsheng.Yang, Sieu.Phan}@nrc.ca

Abstract. Reported in this paper is the developed PMS, a PVC management system for ATM networks. PMS provides a scalable, end-to-end path management solution required for managing today’s complex ATM networks. It aims to assist the network operators to perform PVC operations with simplified procedures and automatic optimum route selection. It also aims to provide effective decision-making support for PVC fault identification and prevention to the network operators.

1

Introduction

ATM communication network is playing more and more important role in today’s telecommunication networks. It has been widely used in backbone networks, transmission networks, access networks, and even enterprise networks. Such emerging large heterogeneous ATM networks have raised many new challenges for researchers and developers in the area of network management. In the management of ATM communication networks that have increased dramatically in size and complexity, the PVC (Permanent Virtual Circuit) management [8][9] is considered as one of the most important tasks. This task mainly consists of PVC operation, which includes path creation, path upgrade and path deletion; PVC fault identification; PVC fault correction; PVC fault prevention; and PVC QoS guarantee and service management. Existing COTS (Commercial Off-the-Shelf) software components provided by different ATM switch vendors can only provide partial support for operators to perform such task, and the procedure of PVC operation is disparate. It is difficulty for operator to perform automatic PVC operation and management. To assist the operator to perform automatic PVC operation and management in complex heterogeneous ATM networks, we developed PMS, a PVC management system for ATM networks based on our DPSAM (Distributed Proactive Self-Adjusting Management) framework [1]. DPSAM framework is generic framework that facilitates the incorporation of AI, distributed-computing, and web-based technologies in the development of network management system. The developing environment is Jess4.0, JDK1.1.6, OrbixWeb3.1, Apach1.3.0 Web-server for Solaris platform and Microsoft Peer Web-server for NT platform. PMS offers a simple mechanism for setting up Permanent Virtual Path Connections (PVPC) and Permanent Virtual Channel Connections (PVCC) with a point-and-click user interface. The PVC can be established automatically or manually according to user-specified requirement and QoS parameters such as throughput and delay. It also monitors and maintains the managed PVCs by performing real-time traffic data analysis, fundamental alarm P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 836–844, 2001 © Springer-Verlag Berlin Heidelberg 2001

PMS: A PVC Management System for ATM Networks

837

correlation, and incident association. When PMS detects some problems or foresees some future anomalies, it will perform the necessary correction or prevention automatically whenever feasible. On the situations that automatic actions are not possible, PMS will notify network operator with detailed information such as the nature of the problems, the location where they occur, the reasons why they happen, and the procedures to correct or prevent them. The developed PMS is an ATM network management tool for service providers and enterprise network operators to effectively manage network resource, to provide good quality service, to improve network performance and to reduce downtime loss. During the research and development of PMS, we have focused on two main issues: PVC operation support with automatic optimum route selection and PVC fault identification and prevention. In this paper, the PMS system architecture and the implementation of PVC operation and management will be presented. This paper is organised as follows: Section 2 discusses the CORBA-based system architecture; Section 3 describes the PVC operations and management; Section 4 is on an experiment environment; and the final section concludes the paper.

2

CORBA-Based System Architecture

PMS is developed based on CORBA-based and three-tiered architecture. The architecture accommodates existing management protocol standards such as SNMPv1, SNMPv2, and CMIP, and uses CORBA as the underlying distributed middleware. The key characteristic of a three-tiered architecture is the separation of distributed computing environment into three layers: presentation, functionality, and data components. This is needed for building flexible, scalable, reusable, maintainable application. CORBA was chosen as the distributed middleware because it is a stable standard with mature products available. The Object Request Broker (ORB) provides a way to invoke methods on remote objects without necessarily knowing the location of those objects, or even their exact functionality. Thus, CORBA clients can manage distributed devices without explicit knowledge of the composition, size, or topology of the network. As shown in Fig.1, the top tier is the view layer. The middle tier is the service layer. The bottom tier is the data layer. For the developed PMS, these three tiers are implemented as follows. View Tier. This tier is made up of user interface applications. These applications invoke the methods of the objects in the middle tier, which may be located in different locations and platforms. PMS View Tier provides web-based user graphical interface for operator to access and control ATM networks from remote locations by using Java-enable browser. These downloadable applications consist of the following user interfaces: • PVC operation support; • network representation and network element view; • PVC status monitoring; • decision-making support for fault management; and • on-line knowledge base updates.

838

C. Yang and S. Phan

Web-based Application

View Tier

D ecision-m aking Support

VP Operation Support

0TCP/IP Service Agents VP Monitoring Agent Fault Agent

Configuration Agent

Service Tier

Performance Agent TCP/IP CORBABus

Multi-protocol Communication Agent

IDL

SNMP

Device

Device

CMIP Device

DMI

Data Tier

Device

Fig. 1 A CORBA-Based Three-Tiered Architecture

Service Tier. It contains the service agents. The main service agents are configuration agent, fault agent, performance agent and PVC monitoring agent. They perform the PVC monitoring and management tasks that include the fundamental functionality recommended by the OSI and TMN. They provide service in response to the requests from the View Tier applications. These agents could be distributed on different locations and platforms, because they are designed to support CORBA IDL communication. These agents mainly perform the following PVC operation and management tasks: • simplified PVC operations with automatic optimum path selection; • fault identification and correction; • fault prediction and prevention; and • automatic fault correction and prevention. Data Tier. This tier is usually made up of objects that interact with database management systems. Because PMS is developed to be able to manage ATM networks that contain multi-vendor equipment [10], this tier is made up of multiprotocol communication agents, which comprise different protocol objects such as SNMP, CMIP, and DMI. Multi-protocol communication agents perform all the

PMS: A PVC Management System for ATM Networks

839

interacting operations with device agents and cope with the requests from service agents to the device agents. From the viewpoint of devices, they map different protocol data objects to IDL data objects and delivers them to service agents. The details how to map the data between IDL and different protocols will be reported in a different paper.

3

PVC Operation and Management

The goals of PMS are to assist the network operator to perform PVC operation with simplified procedures and automatic path routing and selection, and to provide them with effective decision-making support for fault identification and prevention. In this section, we describe briefly the PVC operations, PVC fault identification, and PVC fault prevention. 3.1

PVC Operations

PVC operations and configuration are the principal PVC management tasks in ATM networks. The disparate and proprietary management procedure provided by individual ATM switch vendors has created an environment where it is very difficult to automate the process. The situation will become increasingly untenable in the future as networks continue to develop in size, intricacy and volatility. To solve this problem, Boyer et al [11] proposed to configure the PVC using intelligent mobile agents. Such approach requires that ATM switch can provide an environment to run mobile agents from elsewhere in the network. However, existing ATM switches almost provide SNMP or CMIP support for remote access. Considering such a situation, we are using distributed agents to access ATM switches sequentially by sending requests to each switch. Requests from CORBA clients are IDL data package. Service agent, configuration agent in PMS, will determine the PVC operation sequence (scenario), pack the operation scenarios and pass them to multi-protocol agent. According to operation scenario, multi-protocol agent will determine the action commands to perform PVC operation corresponding to different switches, which support different communication protocols such as SNMPv1, SNMPv3, or CMIP. This methodology is shown in Fig.2. In PMS, the system can perform PVC creation, PVC upgrade, and PVC deletion. PVC creation is to set up a path across a set of ATM switches within an ATM network; PVC upgrade is to route path or negotiate the parameter for existing path; and PVC deletion is to release a path across a set of ATM switches within an ATM network. In this study, we have two objectives for providing PVC operations to operators. The first goal is to provide the simplified procedures to assist operators to perform PVC operations. Using such procedures, operators do not need to worry about the switch specification, operation environments, locations on network, and so on. What they need to do is to specify the node name, the name of group, VPI and VCI for each connected switch. All procedures for PVC operation will be hidden in the system.

840

C. Yang and S. Phan User-specified Requirements: (SW/PNE/VPI/VCI)

Operator

1PMS

Switch A (SNMP) SNMPRequest

Switch B (CMIP)

Switch C (IDL)

SNMP Response CMIPRequest CMIPResponse IDLRequest IDLResponse

Fig. 2. The Methodology of PVC Operations

The second goal is to assist operators to perform PVC operation with the support of automatic path routing and path selection. In a way, operators do not need to determine the path route by themselves from the available resource, which contains thousands of VPI and VCI parameters and network topology. To this end, constraintbased reasoning is used to determine path route and to select an optimal path for the requested PVC path operations. The details how to automatically route and select path will be reported in a different paper due to space limitation. 3.2

PVC Fault Identification

PVC fault identification and prevention are the main PVC management tasks in PMS. To reduce the human error and misunderstanding in the process of fault identification, a knowledge-based approach is considered as one of the most effective approach [2][5][6][7]. There have been a number of achievements in applying knowledge-based approach to alarm correlation. However, these knowledge-based alarm correlation systems can only reduce the amount of alarms, it cannot detect the problem from the viewpoint of PVC management requirement, and it also cannot help operators to make decision for PVC fault identification and fault prevention. Therefore, the operator still needs to make decision for PVC fault correction and prevention by himself. To assist the operators to effectively manage the PVC, we developed a knowledge-based system to identify the PVC problems and make decision on fault correction. This knowledge-based system is implemented by using Jess4.0. The knowledge base consists of DPSAM knowledge, PMS system knowledge, Generic PVC management knowledge, and vendor’s ATM specification knowledge. As shown in Fig. 3, PHB, PSB, PC and PO are defined as PVC fault problems [1]. They stand for path hardware break, path software break, path congestion, and path overload, respectively. IS b, IS , IS , and IS o are incident sets defined for each problem. PVC ph

psb

pc

p

PMS: A PVC Management System for ATM Networks

841

fault identification comprises four main inference procedures: data collection, fault detection, fault isolation, and fault correction. They are described as follows. 3.2.1 Data Collection Fault is a disorder occurring in the hardware or software of the managed ATM switches, or is caused by network traffic density and path routing. Alarm events are external manifestations of the faults. Alarm events are defined by ATM vendors and generated by ATM equipment and they are observable to network operators. In PMS, alarm events are the most important data that must be collected. Alarm events are very useful for detecting PHB and PSH problems. In order to effectively detect path congestion and path overload, it is necessary to collect traffic data for the monitored PVCs. Another reason why we need traffic data is that alarm events might be lost and not real time because they are sent to management system via notification. Consequently, we collect the alarm events from all the managed ATM switches and the traffic data for the monitored PVCs. 3.2.2 Fault Detection The task of fault detection is to find out the symptoms for PVC problem identification from the collected alarm events and traffic data. According to the definition of the incident, fault detection is to generate the corresponding incidents by using fundamental alarm correlation and traffic data analysis; then to associate the incidents and open an incident set for the PVC problems. The following is the description of alarm correlation, traffic data analysis and incident association. Incidents Detection

D1 D2 2 Dm A1 A2 A3 A4 A5 An Collected Data

Rule-based Knowledge Bases for PVC Fault Identification

Traffic Data A nalysis

Alarm Correlation: [A,A,…,A] Î A [A, B, p(A) 1 for some key k, then a search for key k would examine only 1/dth of the table. Theorem 1. Inserting an element into a concurrent hash table with load factor α < 1 requires at most 1/(1 − α) probes on average, assuming uniform hashing. Proof Inserting an element requires an unsuccessful search followed by the placement of the element in the first empty slot found. In an unsuccessful search, every probe but the last accesses an occupied slot, and the last slot probed is empty. Let pi = Pr{exactly i probes access occupied slots} for i = 0, 1, 2, . . .. For i > n, we have pi = 0, since we can find at most n slots already occupied. Thus the expected number of probes is 1+

∞ 

ipi

(1)

i=0

To evaluate (1) we define qi = Pr{at least i probes access occupied slots} for i = 0, 1, 2, . . .. Since i takes on values from the natural numbers ∞ 

ipi =

i=0

∞ 

qi

i=1

The probability that the first probe accesses an occupied slot is n/m. Thus q1 =

n . m

A second probe, if necessary, is to one of the remaining m − 1 unprobed slots, n − 1 of which are occupied, thus,  n  n − 1  . q2 = m m−1 The ith probe is made only if the first i − 1 probes access occupied slots. Thus,      n  n − 1  n i n − (i − 1) ... ≤ = αi , qi = m m−1 m − (i − 1) m

Client-Server Design Alternatives: Back to Pipes but with Threads

863

since (m − n − j)/(m − j) ≤ (m − n)/m when m − n ≤ m and j ≥ 0. Now, we can evaluate (1). 1+

∞  i=0

ipi = 1 +

∞ 

qi ≤ 1 + α + α 2 + α 3 + . . . =

i=1

1 1−α

If α is a constant, Theorem 1 predicts that inserting an element runs in O(1) time. Theorem 2. In a concurrent hash table with load factor α = n/m < 1, the expected number of probes in a successful search is at most 1/α. The proof is similar to that of Theorem 1. If α is a constant, Theorem 2 predicts that searching an element runs in O(1) time. For example, if we have a table with α = 0.95, then the average search will take 1.05 probes, meaning that when the server is overloaded, a worker thread can quickly retrieve a connected socket and service a pending request. 4.2

Analysis of Pipe Synchronization

Here, the roles of producer and consumer are reversed w.r.t. the concurrent hash table. The worker threads insert synchronization tokens (true values) while the main server thread searches for an empty slot to find a free worker. Similarly to hash table, given an array A[1..m] with m elements n of which are set to true, we define the load factor β for A as n/m, β ≤ 1. Proposition 1. Insertion of true by a worker thread takes O(1) time. Theorem 3. Assuming uniform hashing, searching for an element into array A[1..m] with load factor β < 1 requires at most 1/β probes on average by the server thread S. The proof is similar to that of Theorem 1. If β is a constant, Theorem 3 predicts that searching an element runs in O(1) time.

5

Experimental Results

To evaluate the server design alternatives, we run the same client on 35 hosts running Windows NT against each server, measuring the server wall-clock time required to process a fixed number of requests. We summarize all our CPU timings in Table 1. The readings recorded in column 3 (column 4) correspond to 250 milliseconds (500 milliseconds) server delay before sending back the response. Each client spawns 4 child clients to create 4 simultaneous connections to the server, for a maximum of 140 simultaneous connections at the server at any time. Further, each client makes 20 connections to the server amounting to 2800 connections altogether. For the tests involving multithreaded servers, the server

864

B. Roussev and J. Wu Table 1. Timing comparisons of the various server designs # 1 2 3 4 5 6 7

Server description CPU time CPU time Iterative server 700000 Concurrent server, one thread per child 12552 21499 Locking around accept with 50 threads 21153 33602 16562 28960 Shared buffer with 50 threads, 101 capacity 13048 Concurrent queue with 70 threads Concurrent hash table with 50 threads, 101 capacity 14562 24265 Pipes with 150 threads 13195 19253

creates up to 200 worker threads when it starts. We consider also the effect of having too many/few threads. The clients send 1 byte to the server, which responds with 4000 bytes after waiting for a predefined interval of time specified in milliseconds. The number of worker threads and the buffer capacities recorded in the second column of Table 1 were found experimentally to give the best results for the corresponding server design. Table 2 shows how we have arrived at the figures for the server using a concurrent queue. The small CPU time obtained for the concurrent server indicates that spawning a new thread may be less expensive than synchronizing a great number of pre-spawned threads. The smallest CPU time is for the server using pipes. In this design, not only is there no synchronization among the worker threads, but there is no additional cost for spawning worker threads. We were interested to find out the threshold after which the server using pipes denies service, i.e., the effect of having too many threads to synchronize. We ran experiments with up to 700 simultaneous clients, and the server was still providing a satisfactory service. Table 2. Effect of threads number on the performance of the pre-threaded concurrent server using concurrent queue as a shared buffer # threads 10 30 40 50 60 70 80 CPU time 70312 23781 20828 17549 17047 13048 18203

6

Conclusion

In this paper we compared the performance of seven server designs by running them against the same client. The experimental results show that only one prethreaded server, the one using pipes, outperforms the classical concurrent server where the server spawns a new thread to handle the client connection. This leads us to the conclusion that spawning a new thread is less expensive than synchronizing a great number of threads. We introduced a new concurrent data structure called concurrent hash table. Although theoretically sound, in practice

Client-Server Design Alternatives: Back to Pipes but with Threads

865

the performance of the concurrent hash table is not so good as the performance of the server using pipes. We also considered the number of worker threads the server should spawn in order to get maximum performance. We found out that better performance is achieved by using a greater number of worker threads, in the range of 100 rather than 15 as is commonly recommended. We plan to run more experiments to fine-tune the behavior of the concurrent hash table. We are going to test this data structure on a multiprocessor and to gather data about the number of collisions. Similarly to hash tables this concurrent data structure is highly sensitive to the choice of the hash function and the capacity of the table. Theoretically, this server design should give good performance when the load factor α approaches 1.

References 1. T. Cormen et al., Introduction to Algorithms, The MIT Press, 1994. 2. S. Deering and R. Hinden, “Internet Protocol, Version 6 (IPv6) Specification,” RFC 2460, 1998. 3. G.C. Fox and W. Furmanski, “Java for parallel computing and as a general language for scientific and engineering simulation and modeling,” Concurrency: Theory and Practice, Vol 9(6), pp.415-425, 1997. 4. J. Gosling, B. Joy, and G. Steele, The Java Language Specification, Sun Microsystems, Inc., Palo Alto, CA, 1996. 5. E.R. Harold, Java Network Programming. O’Reilly & Associates, 1997. 6. C.A.R. Hoare, “Monitors, An Operating System Structuring Concept,” Communication of the ACM, Vol.17, pp.549-557, Oct. 1974; Erratum in Communication of the ACM, Vol.18, p.95, Feb. 1975. 7. D. Lea, Concurrent Programming in Java, 2nd ed., Addison-Wesley, 1999. 8. M. Michael and M. Scott, “Simple, Fast, and Practical Non-Blocking and Blocking Concurrent Queue Algorithms,” In Proc. of the 15th ACM Symposium on Principles of Distributed Computing, Philadelphia, Pennsylvania, pp. 267-276, May 1996. 9. J. Postel, ed., “Transmission Control Protocol,” RFC 793, 1981. 10. J. Postel, “Internet Protocol,” RFC 760, 1980. 11. B. Roussev and J. Wu, “Lottery-based scheduling of multithreaded Java applications on NOWs,” Annual Review of Scalable Computing, Vol.3, 2001. 12. W.R. Stevens, Unix Network Programming, Vol.1, 2nd ed., Prentice Hall, 1998.

Appendix class HashBuffer { protected SynchronizedRef[] table ; protected int capacity ; public HashBuffer( int capacity ) { this.capacity = capacity ; table = new SynchronizedRef[capacity] ; for ( int i = 0; i < capacity ; i++ ) table[i] = new SynchronizedRef( null ) ; } protected void insert( Object obj ) {

866

B. Roussev and J. Wu int pos = 0 ; int key = obj.hashCode() ; if ( key < 0 ) key = -key ; int hash1 = key % capacity ; int hash2 = 1 + key % (capacity - 1) ; while ( true ) { pos = hash1 ; if ( table[pos].get() == null ) { table[pos].set( obj ) ; return ; } for ( int i = 0; i < capacity ; i++ ) { pos = (pos + hash2) % capacity ; if ( table[pos].get() == null ) { table[pos].set( obj ) ; return ; } } synchronized( obj ) { try { obj.wait( 500 ) ; } catch ( InterruptedException e ) {} } }

}

} protected Object search( int key ) { Object temp = null ; int pos = 0 ; if ( key < 0 ) key = -key ; int hash1 = key % capacity ; int hash2 = 1 + key % (capacity - 1) ; while ( true ) { pos = hash1 ; if ( ( temp = table[pos].set( null ) ) != null ) return temp ; for ( int i = 1; i < capacity ; i++ ) { pos = (pos + hash2) % capacity ; if ( ( temp = table[pos].set( null ) ) != null ) return temp ; } synchronized( obj ) { try { obj.wait( 500 ) ; } catch(InterruptedException e){} } } }

Towards a Descriptive Approach to Model Adaptable Communication Environments Antônio Tadeu A. Gomes, Sérgio Colcher, and Luiz Fernando G. Soares 1

Laboratório TeleMídia – Departamento de Informática – PUC-Rio R. Marquês de São Vicente, 225 – Gávea 22453-900 – Rio de Janeiro – Brasil {atagomes, colcher, lfgs}@inf.puc-rio.br

Abstract. One of the main challenges in the telecommunication sector has been to devise communication environments that allows: (i) the integration of a multitude of different services in a single and efficient communication system, and (ii) the rapid and easy creation, modification and continuous adaptation to new demands and conditions. In this paper, we present a recursive-structuring model that gives adequate support for defining both communication environments and their adaptation mechanisms. Second, we propose the use of frameworks as powerful artifacts that can help a service designer delineate common abstractions that appear within any communication environment, allowing design reuse. Finally, we discuss the role of software architecture, and more precisely of ADLs, as an appropriate way to describe communication environments according to the model and frameworks mentioned above.

1

Introduction

The new telecommunication marketplace has been characterized by an increasing interest in network technologies that can support different quality-of-service (QoS) requirements. The development of innovative applications and new media codification techniques has imposed a continuous research in the telecommunications sector regarding the definition of new services with diverse quality demands, which in general leads to continuous changes in switching systems. However, these changes were only possible, until recently, through slow operational procedures such as hardware or firmware updates. The current trend in this sector has been the development of more versatile switching systems that could deal with the creation or modification of services by means of switching systems software explicitly adapted or programmed during network operation, possibly without any service disruption. In a scenario where telecommunications services are offered by adaptable or programmable communication environments, the complex tasks of service design, implementation and deployment have justified the creation of a “Telecommunications Service Engineering” [21]. Most concepts, principles and rules of this young discipline have been borrowed from software engineerP. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 867–876, 2001 © Springer-Verlag Berlin Heidelberg 2001

868

A.T.A. Gomes, S.Colcher, and L.F.G. Soares

ing, relying heavily on the object-oriented paradigm and on open distributed processing models. The aim of the present work is to propose a set of adequate tools for representing adaptations on generic communication environments by following the service engineering approach. Despite having some similarities with other existing proposals, our work proposes some additional contributions. First, we present the Service Composition Model (SCM), a kind of abstract diagram-based model that allows service designers to describe a particular communication environment as well as the mechanisms in charge of adapting it. Recursion is an outstanding characteristic of SCM in the sense that various parts of a communication environment can be modeled similarly, thus improving the design reuse. However, our model has a purposely relaxed semantics so as to be sufficiently generic, which in turn hinders the identification of the points in a communication environment that can be adapted or programmed to support new services. Thus, we propose the use of object-oriented frameworks as artifacts that feed service designers with information about these “flexible” points. In fact, we have already illustrated on previous works [8] various QoS-specific functions represented with the help of frameworks. Moreover, because of the recursive nature of SCM we could also show how these functions are recurrent on the various parts of a communication environment and how they can cooperate to implement what we call QoS orchestration. Nevertheless, even with the support provided by frameworks, the SCM “box-andline” diagrams remain vague with regard to several aspects that are particularly important during service implementation. We can mention, as examples of these aspects, the interfaces of the components that make part of a communication environment and the maintenance of the overall integrity of the environment in the presence of adaptations. Thus, this paper also discusses the use of formal notations (i.e., Architecture Description Languages – ADLs) to describe these aspects according to SCM concepts. ADLs describe software architectures by means of coarse-grained elements, thus abstracting away from some implementation details while allowing the formal validation of others (e.g. the interactions among components). We make an investigation of several ADLs proposed in the literature and focus on some features that we consider highly desirable to represent component associations in the presence of adaptable QoS constraints. The paper is structured as follows. Section 2 comments on some related works. Section 3 introduces the basic elements that comprise SCM. This section is a summary version of the work published in [4]. Following this, the role of frameworks in the context of SCM is presented in Section 4. Section 5 focuses on the description of the SCM meta service abstractions. Then, Section 6 goes into a insight on some ADLs proposed in the literature with respect to SCM concepts. Finally, some concluding remarks are given in Section 7.

2

Related Work

A multitude of works in the telecommunication sector has taken into consideration the service engineering approach as an adequate way for developing, operating and

Towards a Descriptive Approach to Model Adaptable Communication Environments

869

maintaining services. Most of these works hardly propose effective changes on the traditional service lifecycle, solely focusing on techniques for speeding the service development process. Such techniques include the use of design patterns applied to the domain of service construction [15], languages for modeling services [18] and programming libraries together with extensions in operating systems [9][20]. Despite their relevance, all these techniques do not take into account adaptations accomplished during service operation. Other proposals rely on the concept of generic communication environments. In these environments, object models offer the necessary abstraction for the creation and adaptation of services by means of basic operations on system components, such as factoring, replacements and associations. Programming support offered by environments defined over CORBA and ODP, such as those of the TINA [2] and Binding [11] models, are important examples of this strategy. Extending this approach, the Open-ORB architecture [5] proposes the use of procedural reflection and open implementations [10] as the main concepts behind the design of adaptable communication environments. That is, not only components as a whole but also their internal implementation (which includes the environment itself) can be manipulated in order to adapt a service. All these works have as their main weakness the absence of mechanisms for constraining adaptations, which leads to the possibility of widespread changes that can compromise the integrity of the overall communication environment. SCM provides a conceptual basis that both unifies the ideas of the aforementioned works in a single abstract object model and has an inherent nested organization that regulates the definition of adaptation mechanisms in a homogenized way. We argue, however, that further semantics must be aggregated to SCM so that it can really help service designers model adaptations and its constraints. The Aster Project [3] discusses the problem of adaptation constraining and proposes some add-ons to the aforementioned models, focusing on Open-ORB. The approach adopted is to apply formal descriptions on the definition of environment configurations. More specifically, it aims at supporting the systematic synthesis of these configurations from ADL notations. With the help of proper tools, ADLs can assist service designers in formally verifying an environment configuration, thus guaranteeing the correctness of the configuration before service implementation. As already mentioned, the present paper is also interested in applying the strength of ADL representations in the context of SCM, although we envision the use of ADLs in a different way, as we will show later.

3 Basic Elements of the Service Composition Model Figure 1 illustrates the two basic elements that are used to represent a communication environment according to SCM: (i) user components, which correspond to entities that make direct use of services, and (ii) service providers, which are responsible for offering services. In SCM, the service provider abstraction is defined without any concern with the dispersion of its user components. For instance, components can be as close as objects contained in a single process or as far as objects located on inter-

870

A.T.A. Gomes, S.Colcher, and L.F.G. Soares

networked machines. A special abstraction called MediaPipe is defined in SCM to represent the use of a service by a group of two (point-to-point) or more (multipoint) user components that wish to communicate. MediaPipes also capture the idea of virtual resources over which QoS requirements can be defined and handled. User Component

MediaPipe Service Provider

Fig. 1. Representation of a communication environment according to SCM.

MediaPipes are defined in terms of associations among service components, infrastructure providers and access providers. Service components accomplish the internal implementation of a provider. They may communicate with each other using more primitive providers, called infrastructure providers. Besides the infrastructure providers, there must also be access providers that permit user components to make use of MediaPipes through service components. Figure 2(a) shows the relationship among all these SCM elements. A Service Component

X B

A

Infrastructure Provider

Infrastructure Provider

N C

Y Z

(a)

User Component

Access Service Provider

N-1

B

(b)

X

Z

Y

Fig. 2. Nested organization of SCM. (a) shows the internal structure of a hypothetical service provider, whereas (b) shows the decomposition of a MediaPipe in this service provider.

The infrastructure and access providers can also be structured so that the service components pictured in Figure 2(a) act as user components. Within these providers, other service components, infrastructure and access providers (and, consequently, MediaPipes) show up. This nested organization has some similarities with the layering principle defined by OSI-RM. Figure 2(b) suggests this analogy by illustrating the abstraction of a MediaPipe C between user components A and B, as well as its internal implementation by means of more primitive MediaPipes.

Towards a Descriptive Approach to Model Adaptable Communication Environments

871

Despite its similarity with OSI-RM, SCM introduces other characteristics absent in the former model. As a little, yet very important example, the local system environments are outside the scope of OSI-RM, whereas in SCM they can be represented through access providers. Hence, SCM presents to service designers a most natural way to model QoS provision in an end-to-end scale. Since SCM suggests that the abstraction of a provider may represent all types of communication, it also has a strong potential for design and implementation reuse. For instance, we can define general interfaces and data structures to model some aspects that appear in any kind of communication environment. For example, when considering QoS-specific aspects, this homogenization lessens the work of introducing new QoS requirements and changing existing ones. In addition, as we will show in the following sections, it can facilitate the implementation of algorithms to offer end-to-end QoS.

4 Representing Service Aspects with Frameworks Although SCM allows service designers to describe particular communication system architectures through composition of service providers, we envision that the model alone is not sufficient to help service designers build real communication systems. We argue that additional structures are desired to better delineate the recurrent interfaces and data structures that appear in such architectures. These structures would help service designers not only improve reuse but also regulate the adaptations. In [8], we propose the use of object-oriented frameworks as a strategy to delineate such structures, focusing on QoS aspects. Frameworks capture design decisions that are common to a particular domain. Usually, various parts of a framework cannot be previewed, so they should be left incomplete or “subject to variations”. These “hot spots” [19] allow the definition of adaptable structures and interfaces regardless of the idiosyncrasies of the domain. Specific QoS requirements Environment-specific hot-spots Adaptability hot-spots

Subsystem A Service X1 Subsystem A Architecture

...

QoS orchestration System Service 1

Subsystem A Service X2

SCM + QoS Frameworks

... Subsystem B Service Y1 Subsystem B Architecture

... Subsystem B Service Y2

System Service 2

QoS orchestration

Fig. 3. The different types of hot spots in the service engineering process.

872

A.T.A. Gomes, S.Colcher, and L.F.G. Soares

When concerning frameworks in the context of SCM, further considerations must be taken with regard to the points of adaptation. There are hot spots that should be fulfilled (adaptations should be done) before operation. They are usually only related to the environment dispersion level, that is, the specific subsystem (operating system, internetwork, and so on) in which the frameworks are being applied. There are other hot spots, however, that should be maintained incomplete to be fulfilled in execution time, as again taken QoS frameworks as examples, the points in the subsystems that are programmed to deal with different QoS requirements. In order to adapt the service provider during operation, some kind of adaptation service will be needed, as discussed in the next section. Figure 3 sketches the different types of QoS hot spots during service development.

5 Meta Services According to SCM, in order to be adaptable during operation, a service provider must be the target of special meta services that act upon its elements, performing adaptations. Meta services can be structured, as any service, by means of components and providers. The same provider can be the target of several meta services and the same meta service can act upon multiple providers, regardless of their levels of dispersion. Moreover, meta services can be the target of other meta services, thus defining the concept of meta service towers.

BL

BL

Main Service Provider

ML

BL

Main Service Base Level Service Access

Meta Level Service Access

(a)

BL

BL

Meta Service

BL

ML

ML

BL

Meta Service Provider

(b)

Fig. 4. Services and meta services. (a) shows a compact notation of the meta service relationship illustrated in (b).

The adaptation of components and providers of the target service provider is based on the concept of open implementations. Besides the base-level (BL) interfaces that allow “normal” interactions (access to the services), components and providers of the

Towards a Descriptive Approach to Model Adaptable Communication Environments

873

target service provider must also have meta-level (ML) interfaces that reveal some of their internal aspects, allowing adaptations. Figure 4 illustrates the concept of SCM meta services. As an example of the expressiveness of this concept, when the main service provider also the functions as a meta service provider, we open the perspective of components from both levels directly communicating among each other, which allows the representation of reflective architectures. As an example, Figure 5 illustrates the distribution of the main functions modeled by the QoS frameworks presented in [8] among a typical meta service tower. Because of space restrictions, we omit more details about SCM meta services in this paper. Further information can be found in [4].

Main Service (resource scheduling)

QoS Maintenance

QoS Negotiation

(QoS tuning, monitoring)

(admission control, resource reservation)

QoS Routing

Fig. 5. QoS meta service tower.

As mentioned before, an important characteristic of SCM is its suitability for modeling QoS orchestration. Orchestration relies on concatenation heuristics that decide quantitatively how portions of QoS-provision responsibility will be divided, before and during operation, among the internal MediaPipes that compose a main provider MediaPipe. With the support provided by frameworks, SCM can provide similar QoS interfaces and data structures regardless of the dispersion levels of the QoS functions. Indeed, Figure 3 illustrates that all subsystem services, which collectively build a main system service, derive from a unique general set of interfaces and structures. The definition of uniform and well-known interfaces facilitates the implementation of concatenation heuristics in a seamless way.

6 The Need for a Descriptive Language for SCM The use of SCM diagrams does raise the level of abstraction in which service designers reason about adaptable communication systems architectures. Despite its simplicity SCM encompasses nearly all paradigms of adaptability and programmability found in the literature (in [4] we show a classification of the main adaptation strate-

874

A.T.A. Gomes, S.Colcher, and L.F.G. Soares

gies according to SCM concepts). However, the SCM diagrams show various limitations, such as the absence of more precise information concerning the interfaces of the components and the nature of interaction among them, only to mention a few. These limitations reduce the utility of the SCM diagrams when the service designer faces the service implementation. We believe that the use of ADLs is an appropriate way to describe communication systems and can also eases the development process with the help of proper tools. We have worked on investigating the applicability of several ADLs [1][12][13][14][17] on the context of SCM for the description of adaptable communication environments. The remaining of this section focuses on some issues pertaining to these ADLs, such as the interaction among service components, the support for adaptations and the role of architectural styles. Describing the Quality of Interaction Among Components One of the limitations of the investigated ADLs is the lack of support for specifying the quality of interaction among components. In general, ADLs define connector as the unit of interaction, and the only important description allowed in a connector is related with the communication protocol. No support is offered for the description of qualitative and quantitative constraints (for instance, throughput and delay) imposed by the type of interaction, which is mandatory when taking into consideration the issue of QoS provision. It is worth mentioning a new work in this area [6], which proposes an ADL that gives support to both QoS specification and dynamic QoS management (in terms of monitoring and control components). Identifying the Points of Adaptation Another important feature that an ADL should provide is the support for representing adaptations. Some investigated ADLs [13][14][17] represent adaptations by means of additions and replacements of components and connectors as well as whole architecture reconfiguration. These ADLs do not explicitly offer specific adaptation interfaces (the meta interfaces of SCM) or reflective abstractions that can reveal internal aspects of the components. When a service designer wishes to describe adaptable communication system architectures with the help of these ADLs, it may be hard to realize which parts of the architecture correspond to points of adaptation. The Role of Architectural Styles As it happens with the conceptual basis provided by SCM, an ADL alone may not be useful enough to service designers because the description of all structures of an architecture must be started from scratch. As seen before, frameworks can accomplish the task of describing such structures. However, the description of the QoS frameworks presented in [8] were made with the help of an extended version of the Unified

Towards a Descriptive Approach to Model Adaptable Communication Environments

875

Modeling Language (UML) proposed in [7]. This notation is notoriously limited with regard to distinguishing among descriptions of families of architectures and descriptions of specific architecture configurations, being more adequate to the later. However, the SCM-related frameworks focus exactly on the description of aspects pertaining to the family of adaptable communication architectures. The work presented in [1] introduces the concept of architectural style to exploit commonalties across families of architectures. An architectural style is defined as a set of properties that are shared by various architectural configurations. We envision the use of architectural styles as a very useful tool for applying design decisions captured by the SCM-related frameworks while taking advantage of ADL features. Another important characteristic of architectural styles is their support for constraining architectures. As proposed in [1], a style description may have predicates that must be obeyed by any architecture configuration that makes use of the style. Among other things, the constraints imposed by architectural styles would permit a service designer to explicitly define adaptation constraints, hence helping him to maintain the overall integrity of the environment.

7

Conclusion

This paper proposed a conceptual structuring model that permits the design of adaptable communication system architectures recursively, allowing improvements on design reuse. In addition to this main abstraction, frameworks are used to delineate important aspects that appear recurrently in a communication system, such as the mechanisms in charge of QoS provision. We also showed that, in spite of the strength of SCM representation, a service designer needs more precise information regarding finer-grained implementation details. Hence, we propose the use of ADLs to extend the SCM functionality. Some extensions have been discussed in recent works [3][6], but we envision that the generality of our model can lead to the definition of ADLs with larger scope. At present, we have been working on validating the model by means of two main implementations. First, we modeled the int-serv and diff-serv architectures [16] according to SCM concepts and with the help of the QoS frameworks presented in [8]. The most important result of this research was the definition of a conceptual boundary among service definitions, signalling protocols and QoS functions performed in switched routers. This separation of concerns eases the introduction of new services when programmable-switched routers are available. The second experiment aims at defining appropriate QoS orchestration abstractions among multimedia client applications, multimedia servers and the communication infrastructure, which encompasses spatial and temporal inter-media synchronization, prefetch of multimedia objects and elastic adjustment of multimedia presentations. In all these experiments we wished for a tool that could ease not only the development process but also its documentation, in particular the hot-spot definition. Again, the use of an ADL with the extensions proposed in this paper would be of great help.

876

A.T.A. Gomes, S.Colcher, and L.F.G. Soares

References 1. 2. 3.

4. 5.

6.

7. 8.

9. 10. 11. 12. 13. 14. 15. 16. 17. 18.

19. 20. 21.

Allen, R. J.: A formal approach to software architecture. Ph.D. thesis, School of Computer Science, Carnegie Mellon University, May 1997. Berndt, H., et al.: Service specification concepts in TINA-C. International Conference of Intelligence in Broadband Services and Networks, 1994. Blair, G. S., Blair, L., Issarny, V., Tuma, P., Zarras, A.: The role of software architecture in constraining adaptation in component-based middleware platforms. Proceedings of the 2nd International Conference on Distributed Systems Platforms and Open Distributed Processing (Middleware'2000), IBM Palisades, New York, April 2000. Colcher, S., Gomes, A. T. A., Rodrigues, M. A. A., Soares, L. F. G.: Modeling service aspects in generic communication environments. Tech Report, PUC-Rio, Brazil, 2000. Costa, F. M., Duran-Limon, H. A., Parlavantzas, N., Saikoski, K. B., Blair, G., Coulson, G.: The role of reflective middleware in supporting the engineering of dynamic applications. Reflection and Software Engineering, June 2000. Duran-Limon, H. A., Blair, G. S.: Specifying real-time behaviour in distributed software architectures. 3rd Australasian Workshop on Software and Systems Architectures, Sydney, Australia, November, 2000 Fontoura, M. F. M. C.: A systematic approach to framework development. D.Sc. thesis, PUC-Rio, Brazil, July 1999. Gomes, A. T. A., Colcher, S., Soares, L. F. G.: Modeling QoS provision on adaptable communication environments. International Conference on Communications (ICC2001), Helsinki, Finland (to appear). Hutchison, N. C., Peterson, L. L.: The x-Kernel: an architecture for implementing network protocols. IEEE Transactions of Software Engineering, January 1991. Kiczales, G.: Towards a new model of abstraction in the engineering of software. Proceedings of IMSA’92, Tokio, Japan, November 1992. Lazar, A. A., Lim, K. S., Marconcini, F.: Binding model: motivation and description. Tech. Report CTR 411-95-17, Columbia University, 1995. Luckham, D. C., et al.: Specification and analysis of system architecture using Rapide. IEEE Transactions on Software Engineering, 1995. Magee, J., Kramer, J.: Dynamic structure in software architectures. Proceedings of the 4th ACM Symposium on the Foundations of Software Engineering, 1996. Medvidovic, N.: ADLs and dynamic architecture changes. Proceedings of the 2nd ACM SIGSOFT International Software Architecture Workshop, October 1996. Meszaros, G.: Design patterns in telecommunications systems architecture. IEEE Communications Magazine, April 1999. Mota, O. T. J., Gomes, A. T. A., Colcher, S., Soares, L. F. G.: An adaptable QoS architecture for the Internet. Submitted for Brazillian Symposium on Computer Networks (portuguese version). Paula, V. C. C.: ZCL: A formal framework for specifying dynamic distributed software architectures. D.Sc. thesis, Federal University of Pernambuco, Brazil, May 1999. Perumalla, K. S., Fujimoto, R. M., Ogielski, A. T.: MetaTeD – a meta language for modeling telecommunications networks. Tech. Report GIT-CC-96-32, Georgia Institute of Technology, Atlanta, 1996. Pree, W.: Framework patterns. SIGS Books & Multimedia, 1996. Schmidt, D. C.: The ADAPTATIVE communication environment. Proceedings of the 12th Annual Sun Users Group Conference, San Jose, CA, December 1993. Znaty, S., Hubaux, J.: Telecommunications services engineering: principles, architectures and tools. Proceedings of the ECOOP’97 Workshops, Jyväskylä, Finland, June 1997.

All-to-All Personalized Communication Algorithms in Chordal Ring Networks Hiroshi Masuyama1, Hiroshi Taniguchi2, and Tsutomu Miyoshi3 1 Information and Knowledge Engineering, Tottori University, Tottori, 680-8552, Japan, [email protected]

2 Graduate School, Tottori University, Tottori, 680-8552, Japan, [email protected]

3 Information and Knowledge Engineering, Tottori University, Tottori, 680-8552, Japan, [email protected]

Abstract. Chordal ring networks are ring structured and they become unreliable when nodes or arcs in the ring break down. Such a shortcoming can be circumvented by adding duplicate rings. Though this inherent topology of preparing many loops in the network structure is advantageous to broadcasting, no such broadcasting algorithms have been reported up until now. This paper discusses broadcasting algorithms for Chordal ring networks under the last one of four different communication primitives: One-to-all broadcasting, one-to-all personalized communication, all-to-all broadcasting, all-to-all personalized communication. In this paper, Chordal ring networks are assumed to be not under critical faults, that is, the maximum number of faults we consider is 2. The number of time units required to the proposed algorithm which can tolerate under to the critical faults is made clear.

1. Introduction Parallel computer networks consisting of a large number of identical processing elements are currently in various stages of development. These networks enable the processing elements to intercommunicate. Many reports related to the parallel computer networks such as Mesh connected [1], Cube connected [2], Ring connected [3], and Asynchronous Transfer Mode switching [4] are known. One of recent important issues related to such parallel computer networks is how to construct a high-performing broadcasting algorithm. The above networks have different topological properties that broadcasting is a high performance. Single-loop networks present a better solution to local networking than non-loop networks do, since the network interface and the control software are simple. Singleloop networks, however, tend to become unreliable when nodes or arcs break down. This shortcoming can be circumvented by adding redundant links to single-loop networks. There have been several network architectures proposed for fault-tolerant communications in a distributed system [5]. A Chordal ring network [6] is one of such networks, as is a ring structured network. Chordal ring networks are in a family of regular graphs of degree 3. The diameter or maximum length message path for a P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 877–889, 2001 © Springer-Verlag Berlin Heidelberg 2001

878

H. Masuyama, H. Taniguchi, and T. Miyoshi

properly constructed network was investigated. That the symmetry of the graphs makes it possible to determine massage routing by using a simple distributed algorithm was made clear. From the view point of finding the shortest bypass route in faulty Chordal rings, the reliability analysis of Chordal rings also has been done. In addition, the sorting ability of Chordal ring networks [7], and the ability to perform BPC permutations [8] for nonfaulty Chordal ring networks and [9] for faulty ones have been investigated. The diagnosis approaches for Chordal ring networks also have been presented [10]. In distributed memory system, communication among the processors is performed mainly via message passing. Since the communication time may be quite expensive compared to the computation time, efficient communication schemes are extremely important to achieve high performance in the system. Johnsson and Ho [11] introduced four different communication primitives: 1) one-to-all broadcasting (or single node broadcasting) in which a single node distributes common data to all other nodes, 2) one-to-all personalized communication (or scattering) in which a single node sends unique data to all other nodes, 3) all-to-all broadcasting (or multimode broadcasting) in which all nodes broadcast concurrently to all other nodes, and 4) all-to-all personalized communication (or total exchange) where each and every node sends unique data to every other node. Many researches have proposed various communication algorithms for hypercube multicomputers [12], however, no report has been published for Chordal ring networks. This paper tries to propose a communication algorithm based on 4) of the above four different communication primitives for Chordal ring networks. Communication algorithms can be implemented in either a one-port or an n-port model. In this paper, only an n-port model will be considered, since n-port models can be simulated by a one-port model without losing any efficiency. Hence, all incident links of a node can be used simultaneously for packet transmission and reception.

Fig. 1. Chordal ring with n = 18 and ω = 5 .

All-to-All Personalized Communication Algorithms in Chordal Ring Networks

879

2. Preliminaries Chordal ring consists of n nodes and two types of links; n arcs and some chords. The number n of nodes in a Chordal ring is assumed to be even and nodes are indexed 0, 1, 2, … , n − 1 around the ring. Arcs are links of the type (i, i + 1 mod n) , i = 0, 1, 2, … , n − 1 . In this paper, for another type of link (chords), we restrict our attention to the case in which each odd-numbered node i (i = 1, 3, … , n − 1) is connected to a node (i − ω ) mod n . Accordingly, each even-numbered node j ( j = 0, 2, … , n − 2) is connected to a node ( j + ω ) mod n . Then ω is called chord length and is assumed to be positive odd number. Without loss of generality, we assume that ω ≤ n 2 . For a given number n of nodes, a number of Chordal rings can be obtained for different values of chord length ω . An example of a Chordal ring for n = 18 and ω = 5 is shown in Fig.1. The links can be either unidirectional or bidirectional, but in this paper only the bidirectional links are considered. Note that Chordal ring structure is incrementally extensible by adding multiples of two nodes to the original configuration. However, as the number of nodes increases, the optimal chord length giving the minimum diameter changes. Since it is known that the optimal chord length is nearly equal to

n when the diameter becomes

nearly equal to n , then we will consider such Chordal ring in the followings. Communication algorithms for these Chordal ring networks can be implemented in either a one-port or a 3-port model. In a one-port model, a node can transmit a packet along at most one incident link and can simultaneously receive a packet along at most one incident link. On the other hand, in a 3-port model, all incident links or a node can be used simultaneously for packet transmission and reception. In this paper, only a 3-port model will be considered, since 3-port models can be generally simulated by a one-port model without losing any efficiency, as mentioned in [12]. An algorithm designed for a one-port model is simpler than one designed for a 3-port model and is not considered here. We assume that it takes one time unit to transmit a message from a node to an adjacent node.

R(1)

R(2)

R(i)

Fig. 2. R(1), R(2), and R(i ) in the case of ω = 5 .

880

H. Masuyama, H. Taniguchi, and T. Miyoshi

R(1)

R(6)

Fig. 3.Chordal ring with n = 64 , ω = 9 and rings R(1) and R(6) .

The faults in Chordal ring networks we consider is one in which only the nodes fail because a faulty communication link can be accommodated by treating as a faulty node. In addition, we don't consider critical faults by which communications among nonfaulty nodes are destroyed, then in this paper we will treat single or double faults. [Definition 1] The distance (or length) of the loop is the number of nodes on the loop. (1) Ring R(1) is a loop which is composed of a chord (labeled by (1) in Fig.2), ω arcs bypassed by the chord, and (ω + 1) nodes, in other words, the distance of R(1) is (ω + 1) . (2) Ring R(2) is a loop which is composed of 2 Chords which have only one common arc bypassed by 2 consecutive chords (labeled by (1) and (2)), and 2ω nodes, but not includes the common bypassed arc. The distance of R(2) is 2ω . (3) Ring R(i ) is a loop which is composed of ring R(i − 1) exclusive of an arc bypassed by the i -th additional new chord (labeled by (i)), the additional new chord, and (ω − 1) arcs and nodes bypassed by the additional new chord. The length R(i ) (that is, the number of nodes) of R(i ) is (ω − 1) + 2 . There exist n 2 R(i ) rings in a Chordal ring. The longest R(i ) is R( (n − 2) (ω − 1) . R(i ) is shown in Fig.2. Two node labels R(i ) start and R(i ) end on each loop shown in Fig.2 are special marks to find the loop as mentioned in the followings. Let the distance between two nodes i and j be d (i, j ) . We will call a loop which takes arcs unless it bypasses faults a single loop.

All-to-All Personalized Communication Algorithms in Chordal Ring Networks

881

[Property 1] A Chordal ring has two isolated rings R(1) and R(i ) on condition that n ≥ 2(ω + 1) , where i = (n − ω − 3) (ω − 1) ≥ 1 . Proof: Obvious. A Chordal ring can't have two separated rings R(1) and R(i + 1) . When R(i ) start is node (ω + 2) , any node j on ring R(i ) has two adjacent nodes defined as follows: i) Node j (= ω + 2) has adjacent nodes j + 1 and j + ω , ii) Node j (= ω + 2 + α (ω − 1)) has adjacent nodes j − 1 and j + ω , Node j (= ω + 3 + α (ω − 1)) has adjacent nodes j + 1 and j − ω , iv) Node j (= ω + 3 + i (ω − 1)) has adjacent nodes j − 1 and j − ω , v) Node j (otherwise) has adjacent nodes j − 1 and j + 1 , where α = 1, 2, … , i − 1 . See Fig.3. iii)

[Property 2] A Chordal ring has three isolated rings such as two consecutive rings R(1) and the other ring R(i ) on condition that n ≥ 3(ω + 1) , where i = (n − 2ω − 4) (ω − 1) ≥ 1 . Proof: Obvious. The Chordal ring can't have ring R(i + 1) instead of R(i ) . When

R(i ) start is node 2(ω + 1) + 1 , any node j on ring R(i ) has adjacent nodes defined as follows: i) Node j (= 2(ω + 1) + 1) has adjacent nodes j + 1 and j + ω , ii) Node j (= 2(ω + 1) + 1 + α (ω − 1)) has adjacent nodes j − 1 and j + ω , iii) Node j (= 2(ω + 1) + 2 + α (ω − 1)) has adjacent nodes j + 1 and j − ω , iv) Node j (= 2(ω + 1) + 2 + i (ω − 1)) has adjacent nodes j − 1 and j − ω , v) Node j (otherwise) has adjacent nodes j − 1 and j + 1 , where α = 1, 2, … , i − 1 . See Fig.4.

R(1)

R(1)

R(7)

Fig.4.Chordal ring with n = 64 , ω = 7 which has three rings R(1), R(1) and R(7) .

882

H. Masuyama, H. Taniguchi, and T. Miyoshi

R(1)

R(2) R(2)

R(1)

Fig.5. Chordal ring with n = 64 , ω = 9 which has four rings R(1), R(2), R (1) and R(2) .

[Property 3] A Chordal ring has 4 isolated rings such as R(1) , R(i1 ) , R(1) , and R(i2 ) clockwise on condition that n ≥ 4(ω + 1) , where 1 ≤ i1 ≤ i2 . Proof: Obvious. When node R(i1 ) start is node (ω + 2) , any node j1 on ring R(i1 ) has two adjacent nodes defined as follows: i) Node j1 (= ω + 2) has adjacent nodes j1 + 1 and j1 + ω , ii)

Node j1 (= ω + 2 + α 1 (ω − 1)) has adjacent nodes j1 − 1 and j1 + ω ,

iii)

Node j1 (= ω + 3 + α 1 (ω − 1)) has adjacent nodes j1 + 1 and j1 − ω ,

iv)

Node j1 (= ω + 3 + i1 (ω − 1)) has adjacent nodes j1 − 1 and j1 − ω ,

v)

Node j1 (otherwise) has adjacent nodes j1 − 1 and j1 + 1 ,

where α 1 = 1, 2, … , (( β − 1)(ω + 1) − 2) (ω − 1) − 1 and β is the largest value given by ( β − 1)(ω + 1) ≤ d ( R(i1 ) start , R (i 2 ) start ) . Any node j 2 on ring R(i2 ) has two adjacent nodes defined as follows: i)

Node j 2 (= β (ω + 1) + 1) has adjacent nodes j 2 + 1 and j 2 + ω ,

ii)

Node

j 2 (= β (ω + 1) + 1 + α 2 (ω − 1))

has adjacent nodes

j 2 − 1 and

j 2 (= β (ω + 1) + 2 + α 2 (ω − 1)) has adjacent nodes

j 2 + 1 and

j2 + ω , iii)

Node

j +1, iv)

Node j2 (= β (ω + 1) + 2 + i2 (ω − 1)) has adjacent nodes j 2 − 1 and j 2 − ω ,

v)

Node j 2 (otherwise) has adjacent nodes j 2 − 1 and j 2 + 1 ,

where α 2 = 1, 2, … , (n − β (ω + 1) − 2) (ω − 1) − 1 . See Fig.5.

All-to-All Personalized Communication Algorithms in Chordal Ring Networks

883

3. All-to-All Personalized Communication 3.1 No Fault Send, for every node, its two personal packets to the farthest two nodes in each different directions, next send to the second farthest two nodes in each different directions, ..., and finally send to its both side adjacent nodes connected with an arc as shown in Fig.6. During these operations, for every node, send a packet arrived from its adjacent node to the opposite-side adjacent node connected with an arc. Since we use a Chordal ring as a single loop whose diameter is n 2 , the all-to-all personalized communication can be performed at ∑in=12i time units.

28

29

30

31 0

1

2

3 4 5

27 26

6

25

7

24

8

23

9 10

22

11

21 20

12

13 14 15 16 Fig.6. Packet transmissions from node 0. 19

18 17

3.2 Single Fault Find a ring R(1) with a faulty node f which is in the middle of R(1) , and let it be

R(1) f . Make the longest nonfaulty single loop which is composed of R(i ) start , f

R(i ) end , and all nodes except nodes on R(1) f , and let it be R(1) , as shown by bold lines in Fig.7. All-to-all personalized communication can be performed at ∑αi =1 i + ∑αi =+αβ+1 i time units where α = (n − (ω − 1)) 2 and β = (ω − 1) 2  , as follows: First, For every f

personal packet on R(1) , by sending to all nonfaulty nodes perform all-to-all personalized communication on condition that every node sends received packets to the opposite-side adjacent node (it takes ∑αi =1 i + ∑αi =+αβ+1 i time units as shown in

884

H. Masuyama, H. Taniguchi, and T. Miyoshi

28

29

30

31 0

1

2

3

4 5

27 26

Ring R(1)

25

6

f

7

24

8 9

23

10

22

11

21 20

19

18 17

14 16 15

Fig. 7. Broadcasting in Chordal ring with

13

12

n = 32 , ω = 5 , and faulty node 4.

Fig.8). Next, for every nonfaulty node on R(1) f except R(i ) start and R(i ) end , send f

every personal packet to its adjacent node on R(1) in larger order of destination distance, and the adjacent node send each received packet to the destination node in order, while every node sends received packets to the opposite-side adjacent node (it takes ∑αi =1 i + ∑αi =+αβ+1 i + 1 time unit). Since the last step in the first process mentioned above and the first step in the next process are performed simultaneously, then the required time unit is the one mentioned above. 3.3 Double Fault Let the distance between two faults f1 and f 2 (which also mean node indices, f1 ≤ f 2 for simplicity) be d ( f1 , f 2 ) . We will discuss broadcasting algorithms and the required time units in the following divided four cases. Case of 1 ≤ d ( f1 , f 2 ) ≤ ω : 1)

When f1 + 1 = f 2 as shown in Fig.9 (a); find a ring j1(=ω+2+α1(ω−1) with f1 and f 2 which are in the middle of R(1) . These two faults can be treated as a single fault. The broadcasting algorithm is the almost same as the one in the case of single fault, then it requires ∑αj =1 j + ∑αj =+αβ+1 j time units.

2)

When f1 + 2 = f 2 as shown in Fig.9 (b); first, perform all-to-all personalized communication on fault-free ring R(1)

f

in the same manner as in 3.1. Next,

perform all-to-all personalized communication between nodes on R(1)

f

and

All-to-All Personalized Communication Algorithms in Chordal Ring Networks

28

29

30

31 0

1

2

885

3 4 5

27 26

6

25

7

24

8 9

23

10

22

11

21 20

12 19

18

13

17 16 15 14 Fig. 8. Route of packet transmissions from node 19 (required time units = total distance of arrowheads from node 19).

fault-free nodes on R(1) f as follows: See an example shown Fig.9 (b). Send two packets arrived at node a to node b in two steps (that is, two time units) while send two packets from node b to ring R(1)

f

in different directions. Then,

we can estimate the required time units ∑αj =1 j + ∑αj =1 ( j + 2) . 3)

Otherwise; all-to-all personalized communication can be performed at most at where and γ = {(ω − 1)i + 2} 2 , ∑γj =1 j + ∑γj =1 ( j + 2)

∑γj =1 j + ∑γj =1 ( j + 2) + ∑γj =1 ( j + 3) time units when (n − ω − 3) (ω − 1) is an integer i and not integer, respectively, as follows: ( When (n − ω − 3) (ω − 1) is an integer i ); Chordal ring can be modified as shown in Fig.9 (c). By using ring R(i ) instead of single loop in Fig.8, all-to-all personalized communication can be performed in the same manner as the one in the case of 2). Since the length of ring R(i ) is 2γ , then the above amount of time units is obtained. ( When (n − ω − 3) (ω − 1) is not integer ); Fig.9(d) shows an example of this case. Every nonfaulty node not on ring R(i ) has a path of distance of at most 2 to the nearest node on R(i ) , then the communication algorithm is as follows: First, perform all-to-all personalized communication on fault-free ring R(i ) in the same manner as in 3.1. Next perform all-to-all personalized communication between nodes on R(1)

f

and fault-free nodes on R(1) f whose distance is 1 from ring R(1)

f

(it takes ∑γj =1 ( j + 2) time units), and finally perform all-to-all personalized

886

H. Masuyama, H. Taniguchi, and T. Miyoshi 3 2 j

f1

a

f2

j

j+1 j+2

2

1

b

single loop

(a)

(b)

R(i)

R(i)

(c)

(d) Fig. 9. 4 special cases. f

communication among nodes on R(1) , fault-free nodes on R(1) f whose distance is 2 from the nearest node on ring R(1)

f

(as shown in Fig.10, it takes ∑γj =1 ( j + 3)

time units). Case of ω + 1 = d ( f1 , f 2 ) : ( When (n − ω − 3) (ω − 1) is an integer i ); Every nonfaulty node not on ring R(i ) has a path of distance of at most 3 to the nearest node on R(i) , then the communication algorithm can be easily driven from the one in the case of distance 2. It takes j 1 ( = ω + 3 + i 1 ( ω − 1 )) time units. ( When (n − ω − 3) (ω − 1) is not integer ); Every nonfaulty node not on ring R(i ) has a path of distance of at most 4 to the nearest node on R(i) , then the communication algorithm takes γ γ γ γ γ ∑ j =1 j + ∑ j =1 ( j + 2) + ∑ j =1 ( j + 3) + ∑ j =1 ( j + 4) + ∑ j =1 ( j + 5) time units. Case of ω + 1 < d ( f1 , f 2 ) ≤ 2ω + 1 : ( When (n − 2ω − 4) (ω − 1) is an integer i ); Every nonfaulty node not on ring R(i ) has a path of distance of at most 2 to the nearest node on R(i) , then the communication algorithm takes ∑γj =1 j + ∑γj =1 ( j + 2) + ∑γj =1 ( j + 3) time units.

All-to-All Personalized Communication Algorithms in Chordal Ring Networks

887

g

g 1

j+2 j j+1 j+2

3 4

j+2 j+3

2

1

3

2

c

j j+3 1 e

(a)

e

(b)

Fig.10. Order of packet transmission (a) from g and e to c, (b) from c to g and e where d( g , c ) = d( e , c ) = j + 2.

( When (n − 2ω − 4) (ω − 1) is not an integer ); Every nonfaulty node not an ring R(i ) has a path of distance of at most 3 to the nearest node on R(i) , then the communication algorithm takes ∑γj =1 j + ∑γj =1 ( j + 2) + ∑γj =1 ( j + 3) + ∑γj =1 ( j + 4) time units. Case of 2ω + 1 < d ( f1 , f 2 ) : Every nonfaulty node not on ring R(i ) has a path of distance of at most 1 to the nearest node on R(i ) , then the communication algorithm takes ∑γj =1 j + ∑γj =1 ( j + 2) time units.

4. Performance Results in Comparison with Hypercubes We also presented the number of time units required in N-dimensional hypercubes with faults, that is, 5 ⋅ 2 N −1 − 2 and 5 ⋅ 2 N −1 − N − 1 when single fault and double fault, respectively [13]. Fig.11 shows the comparison of the number of required time units between Chordal rings and hypercubes. The comparison results mean a grade of trade-off (that is, sacrifice) of the number of required time units and the number of required communication links.

888

H. Masuyama, H. Taniguchi, and T. Miyoshi

number of required time units

1000000 100000 f = 0 (hypercube)

10000

f

1000

‚0 (hypercube)

f = 0 (chordal ring) f = 1 (chordal ring)

100

f = 2 (chordal ring)

10 1 0

200

400 600 800 number of nodes

1000

1200

Fig.11. Time units required in Chordal rings and hypercubes.

5. Conclusion All-to-all personalized communication algorithms for Chordal ring networks are proposed in this paper. This algorithm can tolerate to faults except critical faults by which communications among any nodes are destroyed. It can be well guessed that a nonfaulty single-loop requires time units when a single fault exists. By adding the chords, the communication time should be improved. Fig.12 shows the comparison results between single-loop and chordal ring, then gives the answer.

number of required time units

1000000 900000

f= 0 (single loop,chordalring)

800000

f= 1 (single loop)

700000

f= 1 (chordalring)

600000

f= 2 (chordalring)

500000 400000 300000 200000 100000 0 0

200

400

600 800 number of nodes

1000

Fig.12. Time units required in Chordal rings and single-loop.

1200

All-to-All Personalized Communication Algorithms in Chordal Ring Networks

889

References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13]

D.Nassimi, and S.Sahni, "An optimal routing algorithm for meshconnected computers," J.Ass. Comput. Math., Vol. 27, No. 1, pp. 6-29, Jan. 1980. Y.Saad and M.H.Schultz, "Topological Properties of Hypercubes," IEEE Trans. Comput., Vol. 37, No. 6, pp. 867-872, July 1988. J.Tyszer, "A Multiple Fault-Tolerant Processor Network Architecture for Pipeline Computing," IEEE Trans. Comput., Vol. 37, No. 11, pp. 1414-1418, Nov. 1988. A.Varuma and C.S.Raghavendra, "Fault-Tolerant Routing in Multistage Interconnection Networks," IEEE Trans. Comput., Vol. 38, No. 3, pp. 385-393, March 1989. D.K.Pradhan, and S.M.Reddy, "A Fault-Tolerant Communication Architecture for Distributed systems," IEEE Trans. Comput., Vol. C-31, No. 10, pp. 863-870, Oct. 1982. B.W.Arden and H.Lee, "Analysis of Chordal Ring Network," IEEE Trans. Comput., Vol. C-30, No. 4, pp. 291-295, April 1981. H.Kobayashi, and Y.Koga, "Sorting on a Chordal-Ring-Connected Parallel Computer," IECE Trans., Vol. J68-D, No. 3, pp. 253-260, Mar. 1985. H.Masuyama, "Algorithms to Realize on Arbitrary BPC Permutation in Chordal Ring Networks and Mesh Connected Networks," IEICE Trans. Inf. Syst. & Vol. E77-d, No. 10, pp. 1118-1129, Oct. 1994. H.Masuyama and E.Masuyama, "Algorithms to Realize on Arbitrary BPC permutation in Chordal Ring Networks with Failures," 1994 Int. Journal of Reliability, Quality and Safety Eng. Vol. 1, No. 2, pp. 310-314, March 1994. H.Masuyama, and S.Yoden, "An Adaptive System-Level Diagnosis for Chordal Ring Networks," Proceedings of ICCCN, pp. 48-54, Oct. 1996. S.Johnsson and C.T.Ho, "Optimum Broadcasting and Personalized Communication in Hypercubes," IEEE Trans. Comput., Vol. 38, No. 9, pp. 1249-1268, Sept. 1989. S.Park and B.Bose, "All to All Broadcasting in Faulty Hypercubes," IEEE Trans. Comput., Vol. 46, No. 7, pp. 749-755, July 1997. H.Taniguchi, “All-to-All Broadcasting and Personalized communication Algorithms in Chordal Ring,” Master Thesis, Info. and Know. Eng. Tottori Univ. 2001.

Formal and Practical Approach to Load Conditions in High Speed Networks Armin Pollak University of the Armed Forces Munich, Department of Computer Science 3.3 , Werner-Heisenberg-Weg 39, 85577 Neubiberg, Germany, [email protected]

Abstract. There has been little interest in research of high speed networks under heavy load. Only some special areas, like media access has been intensely studied. Within this paper we present an approach to a more formal view of load conditions in high speed networks. We clearly show what load conditions are and combine this work with a practical approach for generating load. We introduce an architecture for generating defined load conditions in high speed networks and show how to use them for performance evaluation.

1

Introduction

The evolution in networking has brought high bandwidth to the desktop. This changed the bottleneck in data transmission: from the (high speed) network itself to the network access points ([4][7]). Due to this tradeoff almost none research is done on heavy load in networks. Only some special areas has been intensly studied under heavy load or overload, with main focus on media access and fairness aspects. We introduce within this paper a formal approach to load conditions in high speed networks and the notation of near-limit load conditions. Our aim is the extension of the simple bandwidth view, used when talking about performance of networks. We want to cover all aspects within high speed networks belonging to performance and want to detect all possible limitations. This requires a new formal view of a high speed network. In the next section we present this formal view of such a network and derive load conditions. This leads towards a notation for load, heavy load and near limit load and shows the impact for performance studies of such networks. Based on these definitions we introduce our framework for generating load conditions in high speed networks. Section 3 describes the implemented prototype for generating traffic and load conditions. Finally we summarize in Sect. 4 our work and give an outlook for future research. 

I want to thank Prof. Dr. Helmut Rzehak, who made this work possible and supported its development with helpful hints and discussions.

P. Lorenz (Ed.): ICN 2001, LNCS 2094, pp. 890–893, 2001. c Springer-Verlag Berlin Heidelberg 2001 

Formal and Practical Approach to Load Conditions in High Speed Networks

2

891

Formal Approach

A common view of networks is based on the OSI reference model and its layered architecture. This approach defines a function oriented view where each layer offers services to the upper layer. Within this model it is not applicable to derive load conditions. Our view is based on a model of interconnected nodes with a container1 oriented data transmission. Each node offers and uses resources for data transmissions and is characterized by its qualities. Resources are scalable elements like buffer, datarate, packets or cells. Scalable means there exists a dimension like number of bits, time, . . . . Qualities define the characteristic for the usage of resources. These qualities describe the interfaces of the nodes. We do not distinguish between interface to the user and connections between nodes. Definition 1 (node, nodes, network). Let R be the set of all resources, and Z the set of all network access points with given qualities, then we define node K = (R, Z) with R ⊆ R, Z ⊆ Z, set of nodes K = {(Ri , Zi ), i = 1 . . . n, Ri ⊆ R, Zi ⊆ Z} and network N = {Ki , i = 1 . . . m, Ki ∈ {K}} According to Def. 1 a network is a set of nodes. The connections are given through the qualities of the network access points. Each connection is a match of two different interfaces with the same qualities2 . Now we define load condition as utilization of a resource or a set of resources. With utilization we mean the usage of a resource, which could be expressed as a percentage of utilization like “90% of available bandwidth” or with a formal description like “save transmission” or “cheap transmission”, which allows to include non countable parameters like security or cost. Definition 2 (utilization,load). For all resources R we define utilization as  0 f ree B : R → {0, 1} : B(R) = 1 used and load as ∃i : B(Ri ), Ri ⊆ R with B(R) = 1 ∀R ∈ Ri Definition 2 gives us the possibility to specify various load conditions as function of resources to the dimension or the range of values of this resources. Nearlimit load condition is then defined as the state where one resource is within the defined near-limit condition, which must be predetermined. This flexible approach to high speed networks allows to model different load conditions. These definitions lead to a formal overall view of load conditions in high speed networks. The mentioned studies of media access or fairness only use a subset of the ressources belonging to a node or a network and therefore restrict performance issues to this isolated view. With our approach it is possible to expand performance issues to an overall view of high speed networks. 1 2

A container is a transport entity (cell, packet, . . . ) which carries unspecified data. It is not necessary to distinguish between different connections between the nodes, because we are only interested how the connection is used.

892

3

A. Pollak

Practical Approach

For the generation of these load conditions a special traffic generator is needed. The basic idea behind our traffic generator is the generation of a specific load in an existing, packet oriented network. The generation is based on sending a packet stream to a network access point, where the length of the packets, the used address information, the inter gap time between the packets and the content of the packets is variable. We think relative time stamps are adequate for our aims and there is no need for global watches. This concept allows to extend former load or traffic generators (for example Strazdas [6] or Yuksel [8]) and to integrate new traffic profiles like those mentioned in [1]. The innovative aspect of this traffic generator is the combination of various traffic sources for different network access points. This is necessary due to the limitations of the network access points. Special load conditions in high speed networks like near-limit load conditions could not be realized with one single traffic source. The traffic sources itself are coordinated by a central instance. We call a run of the traffic generator a test, and the autonomous traffic sources included in such a run a parttest. Each test consists of at least one parttest. The parttest is hardware dependent, whereas the test is hardware independent. Our design concepts are a physical separation of sender and receiver, to exclude any dependencies between these components. Further we use a test management (central instance) and distinguish between two different operation modes: offline and online ([5]). During the offline mode the test and its included parttests are set up. In online mode the execution of the test is done and only some test handling like abort or runtime control are allowed. After a run of the generator the test results are analyzed during another offline phase. In online mode the test management controls the parttests, which are sending back status information to the test management. The architecture of the traffic generator is shown in Fig. 1. The central part is the Load Control (LC) which controls the sender and receiver. LC uses the table management (TM) and the file system (FS). The LC interacts with the GUI, which allows a remote control. Each pair of Load Control Interface (LCI) and Load Processing Entity (LPE) is a sender (generating traffic) or a receiver (collecting data) and is bound to a specific hardware architecture.

4

Summary

In summary load conditions in high speed networks are more than restriction to available bandwidth. This often used simple view does not cover near-limit load conditions. We presented a new approach to this problem, which is very flexible and covers all aspects of high speed networks. So the definition of various load conditions including those with non countable quantities like security is possible. With our traffic generator we showed that the necessary high effort for generating load conditions in high speed networks could be reduced. The remaining restrictions are based on the architecture of the available network access points.

Formal and Practical Approach to Load Conditions in High Speed Networks

893

GUI HW-independent KommBox TM physical Interface

physical Interface

LC

File LCI LPE

FS File

...

LCI HW-dependent LPE

TM Table Management LC Load Control FS File System LCI Load Control Interface LPE Load Processing Entity

Fig. 1. Architecture of the traffic generator

Near-limit conditions are therefor the result of a combination of multiple traffic sources and could not be generated from one single source. So some restriction used in former investigations of heavy load like load generation from a single point or node distances are no longer valid ([2][3]). It should be proved in which way the practical aspects could be integrated in these theoretical investigations. Our work excluded so far some important aspects like flow control, load control, routing or quality of service. It should be proved, how these aspects influences load conditions. Further the implemented traffic generator is far away from completeness and should be adapted to other network architectures.

References

[1] A. Adas. Trac Models in Broadband Networks. IEEE Communications Magazine, 35(7):82{89, July 1997. [2] M. Conti, E. Gregori, and L. Lenzini. Metropolitan Area Networks (MANs): Protocols, Modeling and Performance Evaluation. In Proceedings Performance Evaluation of Computer an Communication Systems, 1993. [3] M. Kabatepe and K. Vastola. A delay analysis of FDQ and DQDB networks. Computer Networks and ISDN Systems, 30:1013{1027, 1998. [4] L. Kleinrock. The Latency/Bandwidth Tradeo in Gigabit Networks. IEEE Communications Magazine, 4:36{40, 1992. [5] A. Pollak. Lastgenerator fur ein Hochgeschwindigkeitsnetz. In Proceedings ITG/GIFachtagung Messung, Modellierung und Bewertung, pages 60{64, 1997. [6] R. Strazdas. A Network Trac Generator For DECNET. MIT/LCS/TM-127, March 1979. [7] H. van As. Media Access Techniques: The Evolution towards terrabit/s LANs and MANs. Computer Networks and ISDN Systems, 26(4):603{656, 1994. [8] M. Yuksel. Trac Generator for an on-line simulator. Master's thesis, Rensselaer Polytechnic Institute, 1999.

Author Index Abolhasan, M. II-186 Ahn, G. II-319 Akimaru, H. I-65 Al-Ibrahim, M. II-239 Al-Regib, G. II-745 Ali, M.M. I-429 Altman, E. II-97 Altunbasak, Y. II-745, II-786 Amorim, C. II-776 Anagnostopoulos, C. I-459 Anagnostopoulos, J. I-459 Anisimov, N. II-559 Ano, S. II-825 Antonakopoulos, T. II-497 Antonov, V. II-559 Araki, T. II-620 Asfour, T. I-589 Ashraf, S.N. II-805 Atmaca, T. I-107, I-348 Balbinot, L.F. I-204 Banerjee, G. II-302 Barakat, C. II-97 Bartoš, R. I-388 Bartz Ceccon, M. II-277 Becker Westphall, C. II-438 Beghdad, R. I-520 Benaboud, H. I-780 Bester, J. II-348 Bettahar, H. I-630 Blanpain, Y. II-259 Boavida, F. II-458 Bonnet, C. II-31 Bordes, J. I-124 Bosquiroli Almeida, M.J. II-277 Bouabdallah, A. I-630 Bouzida, Y. I-520 Boyle, J. II-559 Braun, T. II-206 Brogle, M. II-206 Budkowski, S. I-649 Cáceres Alvarez, L.M. II-438 Caminero, M.B. II-358

Camps, J. II-648 Capelle, A. Van de I-790 Carrapatoso, E. I-27 Carrión, C. II-358 Čavrak, I. II-399 Chang, S.W. I-709 Chao, H.-C. I-307, I-709 Chatterjee, M. I-157 Che, H. I-368 Chen, H.-C. II-225 Chen, J.-L. I-307, I-709 Chen, Y.C. II-82 Cheng, H.-C. I-307 Cherkasova, L. II-71 Choel, B.-Y. I-184 Choi, H. I-698 Choi, I. I-698 Choi, M.C. II-137 Choi, S. II-61 Choi, Y. I-771 Choi, Y.-I. II-380 Choplin, S. II-527 Chow, C.E. I-753 Chow, C.O. II-687 Chujo, T. I-753 Chun, W. II-319 Chung, J.-M. II-735 Čičić, T. I-488 Citro, R. II-538 Colcher, S. II-867 Corral, G. II-648 Czachórski, T. I-107 Das, S.K. I-157 Dastangoo, S. I-336 Davis, C. I-124 Davis IV, N.J. II-370 Decre, N. II-825 Demestichas, P. I-286 Deniz, D.Z. II-570 Denz, P.R. I-449 Dey, D. I-326 Di, Z. I-245 Dimyati, K. II-687

896

Author Index

Droz, P. I-218 Duato, J. II-358 Dutkiewicz, E. I-720, II-186 Ehrensberger, J. I-378 Ehsan, N. II-51 Eissa, H.S. II-268 El-Sayed, A. I-610 Elbiaze, H. I-348 Estepa, R. II-549 Fabbri, A. I-620 Fan, L. I-147 Fan, Z. I-55 Fazekas, P. I-296 Fernández, D. II-697 Fornés, J.M. II-449 Freire, M.M. I-358 Fujii, A. II-845 Fulp, E.W. I-409 Gardiner, J.G. I-147 Garrell, J.M. II-648 Gaspary, L.P. I-204 Ghosh, S. II-538 Gjessing, S. I-488 Glitho, R. II-707 Go, S. II-639 Gomes, A.T.A. II-867 Goossens, I.G. II-795 Goossens, I.M. II-795 Graja, H. I-803 Günter, M. II-206 Guerra, S. II-697 Gupta, A.K. II-815 Gutacker, D. II-590 Ha, E.-J. II-726 Hämäläinen, T. II-250 Hagino, T. II-177 Hamadi, R. II-707 Han, D.H. II-517 Haque, A.U. II-628 Harle, D. I-829 Hasegawa, T. II-825 Hashmani, M. I-398 Hava Muntean, C. I-821 Hayashi, M. II-31

Hayes, J.F. I-429 He, J. I-753 He, X. I-368 Heemstra de Groot, S. I-326 Hegde, M.V. I-124 Hei, X. I-45 Hendler, M. I-478 Hladká, E. II-612 Hoang, D.-H. I-599 Hoang, T.T.M. I-743 Homan, P. II-348 Hommel, G. I-478 Hong, W.-K. II-599 Hsieh, H.-Y. I-569, II-259 Huang, C.-M. I-559 Huie, R. II-707 Ikenaga, T. I-398 Ilyas, M. II-677 Imre, S. I-296, II-11, II-468 Iqbal, T. II-570 Ishikawa, E. II-776 Jäger, R. I-419 Jakobs, K. I-194 Jedruś, S. I-107 Jones, G.A. II-766 Jun, K.-P. II-380 Jung, D.-S. I-1 Jung, M.-J. II-599 Kaario, K. II-250 Kabatnik, M. II-20 Kambo, N.S. II-570 Kamel, T. II-268 Kandel, O. I-657 Kanter, T. I-12 Kesidis, G. II-339 Khan, J.I. II-628 Khotimsky, D.A. I-137 Kim, C. II-61 Kim, K. I-117 Kim, M. II-786 Kim, S.-C. II-735 Kim, Y.-C. II-1 Kinicki, R. I-98 Klöcking, J.-U. I-498 Ko, J.-W. II-1

Author Index

Kobayashi, T. I-167 Konstantinopoulou, C. I-286 Koutsopoulos, K. I-286 Kovacevic, V. I-75 Kovačić, D. II-399 Kuhlins, S. II-590 Kung, H.-Y. I-559 Kuo, S.-Y. I-317 Kure, Ø. I-488 Kwon, J.-H. II-409, II-726 Laalaoua, R. I-107 Lac, C. II-805 Lau, C.-T. II-168 Lavery, B. I-37 Leal, J. II-449, II-549 Lee, B.-J. II-1 Lee, B.-S. II-168, II-380, II-815 Lee, C.L. II-82 Lee, D.-E. II-1 Lee, S.-H. I-1 Lee, Y. I-771 Leiss, E.L. I-549 Li, X. I-235 Liao, H.Y. II-82 Liao, W.-H. II-158 Libeskind-Hadas, R. I-508 Lin, F.Y-.S. II-148 Linwong, P. II-845 Liu, M. II-51 Lorenz, P. II-422 Magoni, D. I-762 Maher, M. I-124 Maihöfer, C. I-498 Makios, V. II-497 Mammeri, Z. II-422 Mandyam, G.D. I-157 Maniatis, S. II-108 Manjanatha, S. I-388 Marbukh, V. II-309 Marias, G.F. I-439 Marques, P. II-458 Marroun, E. II-735 Masuyama, H. II-877 Matsikoudis, E. I-286 McClellan, S. II-579 McManis, J. I-803, I-821

Melhem, R. I-508 Merabti, M. II-507 Merakos, L. I-439 Michalareas, T. I-687 Mikou, N. I-780 Milanovic, S. II-717 Miller, L.K. I-549 Miloslavski, A. II-559 Mirchandani, V. I-720 Miyoshi, T. II-877 Mokhtar, H.M. II-507 Mouchtaris, P. I-117 Mouftah, H.T. I-245 Mouharam, A.A.K. II-658 Müller, F. I-276 Muntean, G.-M. I-540 Murphy, J. I-821 Murphy, L. I-540 Mutka, M.W. I-640, II-71 Nakamura, T. II-620 Naraghi-Poor, M. I-124 Nemoto, Y. II-845 Nguyen, H.N. I-37 Nguyen, H.-T. I-256 Nikolouzou, E.G. I-266 Nilsson, A.A. I-449 Ogino, N. I-673 Oie, Y. I-398 Oktug, S.F. II-390 Oliveira, J. I-27 Onozato, Y. I-579 Owen, H.L. II-137 Pagani, E. I-468 Palola, M. II-478 Pansiot, J.-J. I-762 Papadakis, A.E. II-488 Papadopoulos, A. II-497 Parish, D.J. II-766 Park, C.G. II-517 Park, H.-J. II-380 Park, J.S. II-370 Park, J.-T. II-409, II-726 Park, S.-W. I-1 Perdikeas, M.K. II-488 Pereira, R. II-507

897

898

Author Index

Petrovic, Z. II-717 Pham, H. I-37 Phan, S. II-836 Pieprzyk, J. II-239 Pils, C. I-194 Pinto Lemos, R. II-668 Pletka, R. I-218 Pogosyants, G. II-559 Pollak, A. II-890 Popovic, M. I-75 Potemans, J. I-790 Protonotarios, E.N. I-459 Protopsaltis, N.G. I-459 Pyrovolakis, O.I. II-488 Quiles, F.J.

II-358

Radhakrishnan, S. I-184 Räisänen, V. II-127 Rao, N.S.V. I-184 Rapp, J. I-727 Rashid, E. II-620 Reeves, D.S. I-409 Renno, J.R. II-766 Reschke, D. I-599 Rhee, S.H. I-698 Rindborg, T. I-12 Risso, F. I-85 Roca, V. I-610 Rockenbach Tarouco, L.M. II-277 Rodriguez, J. II-422 Roque, R. I-27 Rossi, G.P. I-468 Rothermel, K. I-498 Roussev, B. II-854 Russell, L. II-71 Rzehak, H. I-256 Sacks, L. I-687 Sahlin, D. I-12 Saleh, H. I-811 Salvador, M.R. I-326 Salvet, Z. II-612 Sampatakos, P.D. I-266 Samtani, S. I-117 Sandhu, H. II-735 Saydam, T. II-329 Scharinger, J. II-196

I-204,

Schmid, A. I-657 Schmid, O. I-124 Sedillot, S. I-27 Seet, B.-C. II-168 Sekkaki, A. II-438 Serhrouchni, A. I-589 Shaikh, F.A. II-579 Shamsuzzaman, M. II-815 Shao, H.-R. I-235 Sheu, J.-P. II-158 Shinagawa, N. I-167 Shiraishi, Y. I-579 Shkrabov, S. II-559 Sidhu, D. II-302 Silva, H.J.A. da I-358 Silva, J. II-458 Silva, L. II-458 Simões, P. II-458 Singh, A.K. II-217 Sivakumar, R. I-569, II-259 Smith, H. I-640 Soares, L.F.G. II-867 Sokol, J. II-137 Solís Barreto, P. II-668 Steigner, C. I-657 Stiller, B. I-218 Storch, R. I-204 Stranjak, A. II-399 Stuckmann, P. I-276 Sue, C.-C. I-317 Sugar, R. II-468 Sung, K.-Y. I-530 Suzuki, M. I-673 Szabo, S. II-11 Takahashi, Y. I-167 Talpade, R. I-117 Tanaka, Y. I-65 Tang, W. II-71 Taniguchi, H. II-877 Tassiulas, L. II-339 Tatsuya Watanabe, W. II-438 Templemore-Finlayson, J. I-649 Ternero, J.A. II-549 Teughels, M. I-790 Theologou, M.E. I-286, I-459 Theunis, J. I-790 Tizraoui, A. I-811 Touvet, F. I-829

Author Index

Tsang, D.H.K. I-45 Tsaur, W.-J. I-174 Tseng, Y.-C. II-158 Tsetsekas, C. II-108 Tsykin, M. II-291 Tunnicliffe, M.J. II-658, II-766 Tutsch, D. I-478 Umemoto, M. I-737 Urien, P. I-811 Van Lil, E. I-790 Venieris, I.S. I-266, II-108, II-488 Vergados, D.D. I-459 Vinyes, J. II-697 Vozmediano, J.M. II-549 Wallbaum, M. I-194 Wang, S.-L. II-158 Wehrle, K. II-117 Wendt, F. I-204 Wolfinger, B.E. II-754 Wong, J.W. II-639 Wong, L. I-117 Woo, M. II-41 Woodward, M.E. Wu, H. I-235 Wu, J. II-854 Wu, Z. II-639

I-147

899

Wuu, L.-C. II-225 Wysocki, T. II-186 Yalamanchili, S. II-358 Yamamoto, U. I-579 Yamori, K. I-65 Yang, C. II-836 Yang, J. I-753 Yang, L. I-640 Yasuda, K. II-177 Yegoshin, L. II-559 Yen, H.-H. II-148 Yoon, J. I-698 Yoshida, M. I-398 Yuan, X. II-677 Yucel, S. II-329 Zaballos, A. II-648 Zaddach, M. II-754 Žagar, M. II-399 Zambenedetti Granville, L. Zappala, D. I-620 Zhang, J. II-250 Zhang, X. I-429 Zheng, Z. I-98 Zhou, J. I-579 Zhuklinets, I.A. I-137 Zorn, W. I-743 Zugenmaier, A. II-20

II-277